MCTS 70-643 Exam Cram: Windows Server 2008...

83

Transcript of MCTS 70-643 Exam Cram: Windows Server 2008...

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure,ConfiguringCopyright © 2009 by Pearson Education, Inc.All rights reserved. No part of this book shall be reproduced, stored in a retrieval sys-tem, or transmitted by any means, electronic, mechanical, photocopying, recording, orotherwise, without written permission from the publisher. No patent liability isassumed with respect to the use of the information contained herein. Although everyprecaution has been taken in the preparation of this book, the publisher and authorassume no responsibility for errors or omissions. Nor is any liability assumed for dam-ages resulting from the use of the information contained herein.ISBN-13: 978-0-7897-3819-6ISBN-10: 0-7897-3819-8Library of Congress Cataloging-in-Publication Data

Regan, Patrick E.MCTS 70-643 exam cram : Windows server 2008 applications infrastructure, config-

uring / Patrick Regan. — 1st ed.p. cm.

ISBN 978-0-7897-3819-6 (pbk. w/cd)1. Electronic data processing personnel—Certification—Study guides. 2. Microsoft

software—Examinations—Study guides. 3. Microsoft Windows server—Examinations—Study guides. I. Title.

QA76.3.R4556 2009005.4’476—dc22

2008033895Printed in the United States of AmericaFirst Printing: September 2008

TrademarksAll terms mentioned in this book that are known to be trademarks or service markshave been appropriately capitalized. Que Publishing cannot attest to the accuracy ofthis information. Use of a term in this book should not be regarded as affecting thevalidity of any trademark or service mark.

Warning and DisclaimerEvery effort has been made to make this book as complete and as accurate as possi-ble, but no warranty or fitness is implied. The information provided is on an “as is”basis. The author and the publisher shall have neither liability nor responsibility to anyperson or entity with respect to any loss or damages arising from the information con-tained in this book or from the use of the CD or programs accompanying it.

Bulk SalesQue Publishing offers excellent discounts on this book when ordered in quantity forbulk purchases or special sales. For more information, please contact

U.S. Corporate and Government [email protected]

For sales outside of the U.S., please contactInternational [email protected]

Associate PublisherDave Dusthimer

Acquisitions EditorBetsy Brown

Development EditorBox TwelveCommunications

Managing EditorPatrick Kanouse

Project EditorAmanda Gillum

Copy EditorMargo Catts

IndexerWordWisePublishing ServicesLLC

ProofreaderSuzanne Thomas

Technical EditorChris Crayton

PublishingCoordinatorVanessa Evans

MultimediaDeveloperDan Scherf

DesignerGary Adair

CompositionTnT Design, Inc

IntroductionWelcome to the 70-643 Exam Cram! Whether this book is your first or your15th Exam Cram series book, you’ll find information here that will help ensureyour success as you pursue knowledge, experience, and certification. This bookaims to help you get ready to take and pass the Microsoft certification exam “TS:Windows Server 2008 Applications Infrastructure, Configuring” (Exam 70-643). After you pass this exam, you will earn the Microsoft Certified TechnologySpecialist: Windows Server 2008 Applications certification.

This introduction explains Microsoft’s certification programs in general andtalks about how the Exam Cram series can help you prepare for Microsoft’s lat-est certification exams. Then Chapters 1 through 9 are designed to remind youof everything you’ll need to know to pass the 70-643 certification exam. The twosample tests at the end of the book (Chapters 10 through 13) should give you areasonably accurate assessment of your knowledge and, yes, we’ve provided theanswers and their explanations for these sample tests. Read the book, understandthe material, and you’ll stand a very good chance of passing the real test.

Exam Cram books help you understand and appreciate the subjects and materi-als you need to know to pass Microsoft certification exams. Exam Cram booksare aimed strictly at test preparation and review. They do not teach you every-thing you need to know about a subject. Instead, the author streamlines andhighlights the pertinent information by presenting and dissecting the questionsand problems he’s discovered that you’re likely to encounter on a Microsoft test.

Nevertheless, to completely prepare yourself for any Microsoft test, we recom-mend that you begin by taking the “Self Assessment” that is included in thisbook, immediately following this introduction. The self-assessment tool helpsyou evaluate your knowledge base against the requirements for becoming aMicrosoft Certified Technology Specialist (MCTS) and will be the first step inearning more advanced certifications, including Microsoft’s IT Professional andProfessional Developer (MCITP and MCPD) and Architect (MCA).

Based on what you learn from the self assessment, you might decide to beginyour studies with classroom training or some background reading. On the otherhand, you might decide to pick up and read one of the many study guides avail-able from Microsoft or third-party vendors. We also recommend that you sup-plement your study program with visits to http://www.examcram.com to receiveadditional practice questions, get advice, and track the Windows certificationprograms.

2

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

This book also offers you an added bonus of access to Exam Cram practice testsonline. This software simulates the Microsoft testing environment with similartypes of questions to those you’re likely to see on the actual Microsoft exam. Wealso strongly recommend that you install, configure, and play around with theMicrosoft Windows Vista and Windows Server 2008 operating systems.Nothing beats hands-on experience and familiarity when it comes to under-standing the questions you’re likely to encounter on a certification test. Booklearning is essential, but without a doubt, hands-on experience is the bestteacher of all!

The Microsoft Certification ProgramMicrosoft currently offers multiple certification titles, each of which boasts itsown special abbreviation. (As a certification candidate and computer profession-al, you need to have a high tolerance for acronyms.)

The certification for end-users is

. Microsoft Office Specialists: For professionals recognized for demon-strating advanced skills with Microsoft desktop software (includingMicrosoft Office).

The older certifications associated with the Windows Server 2003 operatingsystem and related network infrastructure are

. Microsoft Certified Professional (MCP): For professionals who havethe skills to successfully implement Microsoft products (such asWindows XP or Windows Server 2003) or technology as part of a busi-ness solution in an organization.

. Microsoft Certified Desktop Support Technician (MCDST): Forprofessionals who have the technical and customer service skills to trou-bleshoot hardware and software operation issues in Microsoft Windowsenvironments.

. Microsoft Certified Systems Administrators (MCSA): For profes-sionals who administer network and systems environments based on theMicrosoft Windows operating systems. Specializations include MCSA:Messaging and MCSA: Security.

. Microsoft Certified Systems Engineer (MCSE): For professionalswho design and implement an infrastructure solution that is based on theWindows operating system and Microsoft Windows Server System soft-ware. Specializations include MCSE: Messaging and MCSE: Security.

Introduction3

The newer certifications that are based on Windows Vista, Windows Server2008, and related server products are

. Microsoft Certified Technology Specialist (MCTS): For profession-als who target specific technologies and distinguish themselves bydemonstrating in-depth knowledge and expertise in the variousMicrosoft specialized technologies. The MCTS is a replacement for theMCP program.

. Microsoft Certified IT Professional (MCITP): For professionals whodemonstrate comprehensive skills in planning, deploying, supporting,maintaining, and optimizing IT infrastructures. The MCITP is areplacement for the MCSA and MCSE programs.

. Microsoft Certified Architect (MCA): For professionals who are iden-tified as top industry experts in IT architecture and who use multipletechnologies to solve business problems and provide business metrics andmeasurements. Candidates for the MCA program are required to presentto a review board—consisting of previously certified architects—to earnthe certification.

For those who want to become or who are database professionals, the followingcertifications are based on the Microsoft SQL Server products:

. Microsoft Certified Database Administrators (MCDBA): For profes-sionals who design, implement, and administer Microsoft SQL Serverdatabases.

For developers and programmers, the following certifications are based on theMicrosoft .NET Framework and Visual Studio products:

. Microsoft Certified Professional Developer (MCPD): For profes-sionals who are recognized as expert Windows Application Developers,Web Application Developers, or Enterprise Applications Developers.They demonstrate that you can build rich applications that target a vari-ety of platforms such as the Microsoft .NET Framework 2.0.

. Microsoft Certified Application Developers (MCAD): For profession-als who use Microsoft technologies to develop and maintain department-level applications, components, web or desktop clients, or back-end dataservices.

4

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

For trainers and curriculum developers, the following certifications are available:

. Microsoft Certified Trainer (MCT): For qualified instructors who arecertified by Microsoft to deliver Microsoft training courses to IT profes-sionals and developers.

. Microsoft Certified Learning Consultant (MCLC): Recognizes MCTswhose job roles have grown to include frequent consultative engagementswith their customers and who are experts in delivering customized learningsolutions that positively affect customer return on investment (ROI).

In 2008, Microsoft introduced two advanced certifications. The Master certifi-cations identify individuals with the deepest technical skills available on a partic-ular Microsoft product such as Windows Server 2008, Exchange 2007, and SQLServer 2008. To achieve Master certification, candidates must attend severalrequired sessions, successfully complete all in-class (written and lab) exams, andsuccessfully complete a qualification lab exam.

The highest level certification is the Microsoft Certified Architect (MCA) pro-gram focusing on IT architecture. Microsoft Certified Architects have provenexperience with delivering solutions and can communicate effectively with busi-ness, architecture, and technology professionals. These professionals have threeor more years of advanced IT architecture experience and possess strong tech-nical and leadership skills. Candidates are required to pass a rigorous ReviewBoard interview conducted by a panel of experts.

The best place to keep tabs on all Microsoft certifications is the following website:

http://www.microsoft.com/learning/default.mspx

Microsoft changes their website often, so if this URL does not work in thefuture, you should use the Search tool on Microsoft’s site to find more informa-tion on a particular certification.

Microsoft Certified Technology SpecialistTechnology Specialist certifications enable professionals to target specific tech-nologies and to distinguish themselves by demonstrating in-depth knowledgeand expertise in their specialized technologies. Microsoft Technology Specialistsare consistently capable of implementing, building, troubleshooting, and debug-ging a particular Microsoft technology.

At the time of the writing of this book, there are 28 Microsoft CertifiedTechnology Specialist (MCTS) certifications:

Technology Specialist: SQL Server 2008, Business IntelligenceDevelopment and Maintenance

Introduction5

Technology Specialist: SQL Server 2008, Database DevelopmentTechnology Specialist: SQL Server 2008, Implementation and MaintenanceTechnology Specialist: .NET Framework 3.5, Windows PresentationFoundation ApplicationsTechnology Specialist: .NET Framework 3.5, Windows CommunicationFoundation ApplicationsTechnology Specialist: .NET Framework 3.5, Windows WorkflowFoundation ApplicationsTechnology Specialist: .NET Framework 2.0, Web Applications Technology Specialist: .NET Framework 2.0, Windows Applications Technology Specialist: .NET Framework 2.0, Distributed Applications Technology Specialist: SQL Server 2005Technology Specialist: SQL Server 2005, Business IntelligenceTechnology Specialist: BizTalk Server 2006Technology Specialist: Microsoft Office Project Server 2007, EnterpriseProject ManagementTechnology Specialist: Microsoft Office Project 2007, Project ManagementTechnology Specialist: Microsoft Office Live Communications Server 2005Technology Specialist: Microsoft Exchange Server 2007, ConfigurationTechnology Specialist: Microsoft Office SharePoint Server 2007,ConfigurationTechnology Specialist: Microsoft Office SharePoint Server 2007,Application DevelopmentTechnology Specialist: Windows Mobile 5.0, ApplicationsTechnology Specialist: Windows Mobile 5.0, Implementation andManagementTechnology Specialist: Windows Server 2003, Hosted Environments,Configuration, and ManagementTechnology Specialist: Windows Server 2008, Active Directory Configuration Technology Specialist: Windows Server 2008, Network InfrastructureConfiguration Technology Specialist: Windows Server 2008, Applications InfrastructureConfiguration Technology Specialist: Windows SharePoint Services 3.0, ApplicationDevelopmentTechnology Specialist: Windows SharePoint Services 3.0, ConfigurationTechnology Specialist: Windows Vista and 2007 Microsoft Office SystemDesktops, Deployment and MaintenanceTechnology Specialist: Windows Vista, Configuration

6

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

Microsoft Certified IT Professional The new Microsoft Certified IT Professional (MCITP) credential lets youhighlight your specific area of expertise. Now, you can easily distinguish your-self as an expert in database administration, database development, businessintelligence, or support. At the time of this writing, the following MicrosoftCertified IT Professional certifications exist:

IT Professional: Database Developer IT Professional: Database Administrator IT Professional: Business Intelligence Developer IT Professional: Enterprise Support TechnicianIT Professional: Consumer Support TechnicianIT Professional: Database Developer 2008IT Professional: Database Administrator 2008IT Professional: Enterprise Messaging AdministratorIT Professional: Enterprise Project Management with Microsoft OfficeProject Server 2007IT Professional: Enterprise AdministratorIT Professional: Server Administrator

The MCTS on Windows Server 2008 helps you and your organization takeadvantage of advanced server technology with the power to increase the flexibili-ty of your server infrastructure, save time, and reduce costs. Transition certifica-tions are available today for Windows Server 2003 certified professionals, whilefull certification paths will be available soon after the Windows Server 2008 prod-uct release. For more details about these certifications, visit the following website:

http://www.microsoft.com/learning/mcp/windowsserver2008/default.mspx

If the URL is no longer available, don’t forget to search for MCTS and WindowsServer 2008 with the Microsoft search tool found on the Microsoft website.

Microsoft Certified TechnologySpecialist: Windows Server 2008Applications InfrastructureThe Microsoft Certified Technology Specialist certifications enable profession-als to target specific technologies and distinguish themselves by demonstratingin-depth knowledge and expertise in their specialized technologies. A Microsoft

Introduction7

Certified Technology Specialist in Windows Vista, Configuration possesses theknowledge and skills to configure Windows Vista for optimal performance onthe desktop, including installing, managing, and configuring the new security,network, and application features in Windows Vista.

To earn the Microsoft Certified Technology Specialist: Windows Vista,Configuration, you must pass one exam that focuses on supporting end-userissues about network connectivity, security, applications installation and com-patibility, and logon problems that include account issues and password resets:

Exam 70-643: TS: Windows Server 2008 Applications Infrastructure,Configuration

If you decide to take Microsoft recognized class, you would take several classesto cover all of the material found on this exam. The preparation guide (includ-ing exam objectives) for Exam 70-643 TS: Windows Server 2008 ApplicationsInfrastructure, Configuration can be found at

http://www.microsoft.com/learning/exams/70-643.mspx

Taking a Certification ExamAfter you prepare for your exam, you need to register with a testing center. Atthe time of this writing, the cost to take exam 70-643 is (U.S.) $125, and if youdon’t pass, you can take each again for an additional (U.S.) $125 for eachattempt. In the United States and Canada, tests are administered by Prometric.Here’s how you can contact them:

. Prometric: You can sign up for a test through the company’s website,http://www.2test.com or http://www.prometric.com. Within the UnitedStates and Canada, you can register by phone at 800-755-3926. If youlive outside this region, you should check the Prometric website for theappropriate phone number.

To sign up for a test, you must possess a valid credit card or contact Prometricfor mailing instructions to send a check (in the United States). Only when pay-ment is verified, or a check has cleared, can you actually register for a test.

To schedule an exam, you need to call the appropriate phone number or visit thePrometric websites at least one day in advance. To cancel or reschedule an examin the United States or Canada, you must call before 3 p.m. Eastern time the daybefore the scheduled test time (or you might be charged, even if you don’t showup to take the test). When you want to schedule a test, you should have the fol-lowing information ready:

8

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

. Your name, organization, and mailing address.

. Your Microsoft test ID. (In the United States, this means your SocialSecurity number; citizens of other countries should call ahead to find outwhat type of identification number is required to register for a test.)

. The name and number of the exam you want to take.

. A method of payment. (As mentioned previously, a credit card is the mostconvenient method, but alternate means can be arranged in advance, ifnecessary.)

After you sign up for a test, you are told when and where the test is scheduled. Youshould arrive at least 15 minutes early. You must supply two forms of identification—one of which must be a photo ID—to be admitted into the testing room.

Tracking Certification StatusAs soon as you pass a qualified Microsoft exam and earn a professional certifica-tion, Microsoft generates transcripts that indicate which exams you have passed.You can view a copy of your transcript at any time by going to the MCP securedsite (this site may change as the MCP is retired) and selecting the Transcript Tool.This tool enables you to print a copy of your current transcript and confirm yourcertification status.

After you pass the necessary set of exams, you are certified. Official certification isnormally granted after six to eight weeks, so you shouldn’t expect to get your cre-dentials overnight. The package for official certification that arrives includes aWelcome Kit that contains a number of elements (see Microsoft’s website forother benefits of specific certifications):

. A certificate that is suitable for framing, along with a wallet card and lapel pin.

. A license to use the related certification logo, which means you can use thelogo in advertisements, promotions, and documents, and on letterhead,business cards, and so on. Along with the license comes a logo sheet, whichincludes camera-ready artwork. (Note that before you use any of the art-work, you must sign and return a licensing agreement that indicates you’llabide by its terms and conditions.)

. Access to the Microsoft Certified Professional Magazine Online website, whichprovides ongoing data about testing and certification activities, require-ments, changes to the MCP program, and security-related information onMicrosoft products.

Introduction9

Many people believe that the benefits of MCP certification go well beyond theperks that Microsoft provides to newly anointed members of this elite group.We’re starting to see more job listings that request or require applicants to haveMicrosoft and other related certifications, and many individuals who completeMicrosoft certification programs can qualify for increases in pay and responsibil-ity. As an official recognition of hard work and broad knowledge, a certificationcredential is a badge of honor in many IT organizations.

About This BookEach topical Exam Cram chapter follows a regular structure and contains graphicalcues about important or useful information. Here’s the structure of a typical chapter:

. Opening hotlists: Each chapter begins with a list of the terms, tools, andtechniques that you must learn and understand before you can be fully con-versant with that chapter’s subject matter. The hotlists are followed with oneor two introductory paragraphs to set the stage for the rest of the chapter.

. Topical coverage: After the opening hotlists and introductory text, eachchapter covers a series of topics related to the chapter’s subject.Throughout that section, we highlight topics or concepts that are likely toappear on a test, using a special element called an Exam Alert:

EXAM ALERTThis is what an Exam Alert looks like. Normally, an alert stresses concepts, terms,software, or activities that are likely to relate to one or more certification-test ques-tions. For that reason, we think any information in an Exam Alert is worthy of unusualattentiveness on your part.

You should pay close attention to material flagged in Exam Alerts;although all the information in this book pertains to what you need toknow to pass the exam, Exam Alerts contain information that is reallyimportant. You’ll find what appears in the meat of each chapter to beworth knowing, too, when preparing for the test. Because this book’smaterial is very condensed, we recommend that you use this book alongwith other resources to achieve the maximum benefit.

In addition to the Exam Alerts, we provide tips that will help you build abetter foundation for Windows Server 2008 knowledge. Although the tipinformation might not be on the exam, it is certainly related and it willhelp you become a better-informed test taker.

10

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

. Exam prep questions: Although we talk about test questions and topicsthroughout the book, the section at the end of each chapter presents aseries of mock test questions and explanations of both correct and incor-rect answers.

. Details and resources: Every chapter ends with a section titled “Needto Know More?” That section provides direct pointers to Microsoft andthird-party resources that offer more details on the chapter’s subject. Inaddition, that section tries to rank or at least rate the quality and thor-oughness of the topic’s coverage by each resource. If you find a resourceyou like in that collection, you should use it, but you shouldn’t feel com-pelled to use all the resources. On the other hand, we recommend onlyresources that we use on a regular basis, so none of our recommenda-tions will be a waste of your time or money (but purchasing them all atonce probably represents an expense that many network administratorsand Microsoft certification candidates might find hard to justify).

The bulk of the book follows this chapter structure, but we’d like to point out afew other elements. Chapters 10 to 13—two practice exams and their answers(with detailed explanations)—help you assess your understanding of the materi-al presented throughout the book to ensure that you’re ready for the exam.

Finally, the tear-out Cram Sheet attached next to the inside front cover of thisExam Cram book represents a condensed collection of facts and tips that wethink are essential for you to memorize before taking the test. Because you candump this information out of your head onto a sheet of paper before taking theexam, you can master this information by brute force; you need to remember itonly long enough to write it down when you walk into the testing room. Youmight even want to look at it in the car or in the lobby of the testing center justbefore you walk in to take the exam.

We’ve structured the topics in this book to build on one another. Therefore,some topics in later chapters make the most sense after you’ve read earlier chap-ters. That’s why we suggest that you read this book from front to back for yourinitial test preparation. If you need to brush up on a topic or if you have to boneup for a second try, you can use the index or table of contents to go straight to

NOTEThis is how notes are formatted. Notes direct your attention to important pieces of infor-mation that relate to Windows Server 2008 and Microsoft certification.

This is how tips are formatted. Keep your eyes open for these, and you’ll become aWindows Server 2008 guru in no time!

TIP

Introduction11

the topics and questions that you need to study. Beyond helping you prepare forthe test, we think you’ll find this book useful as a tightly focused reference tosome of the most important aspects of Windows Vista.

The book uses the following typographical conventions:

. Command-line strings that are meant to be typed into the computer aredisplayed in monospace text, such as

net use lpt1: \\print_server_name\printer_share_name

. New terms are introduced in italics.

Given all the book’s elements and its specialized focus, we’ve tried to create a toolthat will help you prepare for and pass Microsoft Exam 70-643. Please share with usyour feedback on the book, especially if you have ideas about how we can improveit for future test takers. Send your questions or comments about this book via emailto [email protected]. We’ll consider everything you say carefully, andwe’ll respond to all suggestions. For more information on this book and other QueCertification titles, visit our website at http://www.quepublishing.com. You shouldalso check out the new Exam Cram website at http://www.examcram.com, whereyou’ll find information, updates, commentary, and certification information.

Exam Layout and DesignHistorically, there have been six types of question formats on Microsoft certifi-cation exams. These types of questions continue to appear on current Microsofttests, and they are discussed in the following sections:

. Multiple-choice, single answer

. Multiple-choice, multiple answers

. Build-list-and-reorder (list prioritization)

. Create-a-tree

. Drag-and-connect

. Select-and-place (drag-and-drop)

The Single-Answer and Multiple-AnswerMultiple-Choice Question FormatsSome exam questions require you to select a single answer, whereas others askyou to select multiple correct answers. The following multiple-choice questionrequires you to select a single correct answer. Following the question is a briefsummary of each potential answer and why it is either right or wrong.

12

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

1. You have three domains connected to an empty root domain under one contiguousdomain name: tutu.com. This organization is formed into a forest arrangement, with a sec-ondary domain called frog.com. How many schema masters exist for this arrangement?

❍ A. 1

❍ B. 2

❍ C. 3

❍ D. 4

1. The correct answer is A because only one schema master is necessary for a forestarrangement. The other answers (B, C, and D) are misleading because they try to makeyou believe that schema masters might be in each domain or perhaps that you shouldhave one for each contiguous namespace domain.

This sample question format corresponds closely to the Microsoft certificationexam format. The only difference is that on the exam, the questions are not fol-lowed by answers and their explanations. To select an answer, you position thecursor over the option button next to the answer you want to select. Then youclick the mouse button to select the answer.

Let’s examine a question for which one or more answers are possible. This typeof question provides check boxes rather than option buttons for marking allappropriate selections.

2. What can you use to seize FSMO roles? (Choose two.)

❍ A. The ntdsutil.exe utility

❍ B. The Active Directory Users and Computers console

❍ C. The secedit.exe utility

❍ D. The utilman.exe utility

2. Answers A and B are correct. You can seize roles from a server that is still runningthrough the Active Directory Users and Computers console, or in the case of a serverfailure, you can seize roles with the ntdsutil.exe utility. You use thesecedit.exe utility to force group policies into play; therefore, Answer C is incor-rect. The utilman.exe tool manages accessibility settings in Windows Server 2003;therefore, Answer D is incorrect.

This particular question requires two answers. Microsoft sometimes gives par-tial credit for partially correct answers. For Question 2, you have to mark thecheck boxes next to Answers A and B to obtain credit for a correct answer.Notice that to choose the right answers you also need to know why the otheranswers are wrong.

Introduction13

The Build-List-and-Reorder Question FormatQuestions in the build-list-and-reorder format present two lists of items—oneon the left and one on the right. To answer the question, you must move itemsfrom the list on the right to the list on the left. The final list must then bereordered into a specific sequence.

These questions generally sound like this: “From the following list of choices,pick the choices that answer the question. Arrange the list in a certain order.”Question 3 shows an example of how these questions would look.

3. From the following list of famous people, choose those who have been elected presi-dent of the United States. Arrange the list in the order in which the presidents served.

. Thomas Jefferson

. Ben Franklin

. Abe Lincoln

. George Washington

. Andrew Jackson

. Paul Revere

3. The correct answer is

1. George Washington

2. Thomas Jefferson

3. Andrew Jackson

4. Abe Lincoln

On an actual exam, the entire list of famous people would initially appear in thelist on the right. You would move the four correct answers to the list on the leftand then reorder the list on the left. Notice that the answer to Question 3 doesnot include all the items from the initial list. However, that might not always bethe case.

To move an item from the right list to the left list on the exam, you first selectthe item by clicking it, and then you click the Add button (left arrow). After youmove an item from one list to the other, you can move the item back by firstselecting the item and then clicking the appropriate button (either the Add but-ton or the Remove button). After you move items to the left list, you can reorderan item by selecting the item and clicking the up or down arrow buttons.

14

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

The Create-a-Tree Question FormatQuestions in the create-a-tree format also present two lists—one on the left sideof the screen and one on the right side of the screen. The list on the right con-sists of individual items, and the list on the left consists of nodes in a tree. Toanswer the question, you must move items from the list on the right to theappropriate node in the tree.

These questions can best be characterized as simply a matching exercise. Itemsfrom the list on the right are placed under the appropriate category in the liston the left. Question 4 shows an example of how they would look.

4. The calendar year is divided into four seasons:

1. Winter

2. Spring

3. Summer

4. Fall

Identify the season during which each of the following holidays occurs:

❍ Christmas

❍ Fourth of July

❍ Labor Day

❍ Flag Day

❍ Memorial Day

❍ Washington’s Birthday

❍ Thanksgiving

❍ Easter

4. The correct answers are

1. Winter

. Christmas

. Washington’s Birthday

2. Spring

. Flag Day

. Memorial Day

. Easter

Introduction15

3. Summer

. Fourth of July

. Labor Day

4. Fall

. Thanksgiving

In this case, you use all the items in the list. However, that might not always bethe case.

To move an item from the right list to its appropriate location in the tree, youmust first select the appropriate tree node by clicking it. Then, you select the itemto be moved and click the Add button. After you add one or more items to a treenode, the node appears with a + icon to the left of the node name. You can clickthis icon to expand the node and view the items you have added. If you haveadded any item to the wrong tree node, you can remove it by selecting it andclicking the Remove button.

The Drag-and-Connect Question FormatQuestions in the drag-and-connect format present a group of objects and a list of“connections.” To answer the question, you must move the appropriate connec-tions between the objects.

This type of question is best described with graphics. For this type of question, itisn’t necessary to use every object, and you can use each connection multiple times.

The Select-and-Place Question FormatQuestions in the select-and-place (drag-and-drop) format display a diagram withblank boxes and a list of labels that you need to drag to correctly fill in the blankboxes. To answer such a question, you must move the labels to their appropriatepositions on the diagram. This type of question is best described with graphics.

Special Exam Question FormatsStarting with the exams released for the Windows Server 2003 MCSE track,Microsoft introduced several new question types in addition to the more traditionaltypes of questions that are still widely used on all Microsoft exams. These innovativequestion types have been highly researched and tested by Microsoft before they werechosen to be included in many of the “refreshed” exams for the MCSA/MCSE onthe Windows 2000 track and for the new exams on the Windows Server 2003 andWindows Server 2008 track. These special question types are as follows:

16

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

. Hot area questions

. Active screen questions

. Drag-and-drop–type questions

. Simulation questions

Hot Area Question TypesHot area questions ask you to indicate the correct answer by selecting one ormore elements within a graphic. For example, you might be asked to select mul-tiple objects within a list.

Active Screen Question TypesActive screen questions ask you to configure a dialog box by modifying one ormore elements. These types of questions offer a realistic interface in which youmust properly configure various settings, just as you would within the actualsoftware product. For example, you might be asked to select the proper optionwithin a drop-down list box.

Drag-and-Drop Question TypesNew drag-and-drop questions ask you to drag source elements to their appro-priate corresponding targets within a work area. These types of questions testyour knowledge of specific concepts and their definitions or descriptions. Forexample, you might be asked to match a description of a computer program tothe actual software application.

Simulation Question TypesSimulation questions ask you to indicate the correct answer by performing spe-cific tasks, such as configuring and installing network adapters or drivers, con-figuring and controlling access to files, or troubleshooting hardware devices.Many of the tasks that systems administrators and systems engineers performcan be presented more accurately in simulations than in most traditional examquestion types.

Microsoft’s Testing FormatsCurrently, Microsoft uses three different testing formats:

. Fixed length

. Short form

. Case study

Introduction17

Other Microsoft exams employ advanced testing capabilities that might not beimmediately apparent. Although the questions that appear are primarily multiplechoice, the logic that drives them is more complex than that in older Microsofttests, which use a fixed sequence of questions, called a fixed-length test. Some ques-tions employ a sophisticated user interface, which Microsoft calls a simulation, totest your knowledge of the software and systems under consideration in a more-or-less “live” environment that behaves just like the real thing. You should reviewthe Microsoft Learning, Reference, and Certification Web pages athttp://www.microsoft.com/learning/default.mspx for more detailed information.

In the future, Microsoft might choose to create exams using a well-known tech-nique called adaptive testing to establish a test taker’s level of knowledge and prod-uct competence. In general, adaptive exams might look the same as fixed-lengthexams, but they discover the level of difficulty at which an individual test takercan correctly answer questions. Test takers with differing levels of knowledge orability therefore see different sets of questions; individuals with high levels ofknowledge or ability are presented with a smaller set of more difficult questions,whereas individuals with lower levels of knowledge are presented with a larger setof easier questions. Two individuals might answer the same percentage of ques-tions correctly, but the test taker with a higher knowledge or ability level willscore higher because his or her questions are worth more. Also, the lower-leveltest taker will probably answer more questions than his or her more knowledge-able colleague. This explains why adaptive tests use ranges of values to define thenumber of questions and the amount of time it takes to complete the test.

Most adaptive tests work by evaluating the test taker’s most recent answer. A cor-rect answer leads to a more difficult question, and the test software’s estimate of thetest taker’s knowledge and ability level is raised. An incorrect answer leads to a lessdifficult question, and the test software’s estimate of the test taker’s knowledge andability level is lowered. This process continues until the test targets the test taker’strue ability level. The exam ends when the test taker’s level of accuracy meets a sta-tistically acceptable value (in other words, when his or her performance demon-strates an acceptable level of knowledge and ability) or when the maximum numberof items has been presented. (In which case, the test taker is almost certain to fail.)

Microsoft has also introduced a short-form test for its most popular tests. Thistest delivers 25 to 30 questions to its takers, giving them exactly 60 minutes tocomplete the exam. This type of exam is similar to a fixed-length test in that itallows readers to jump ahead or return to earlier questions and to cycle throughthe questions until the test is done. Microsoft does not use adaptive logic in

NOTEMicrosoft does not offer adaptive exams at the time of this book’s publication.

18

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

short-form tests, but it claims that statistical analysis of the question pool is suchthat the 25 to 30 questions delivered during a short-form exam conclusivelymeasure a test taker’s knowledge of the subject matter in much the same way asan adaptive test. You can think of the short-form test as a kind of “greatest hitsexam” (that is, it covers the most important questions) version of an adaptiveexam on the same topic.

Because you won’t know which form the Microsoft exam might take, you shouldbe prepared for either a fixed-length or short-form exam. The layout is the samefor both fixed-length and short-form tests—you are not penalized for guessingthe correct answer(s) to questions, no matter how many questions you answerincorrectly.

The Fixed-Length and Short-Form ExamStrategyOne tactic that has worked well for many test takers is to answer each questionas well as you can before time expires on the exam. Some questions you willundoubtedly feel better equipped to answer correctly than others; however, youshould still select an answer to each question as you proceed through the exam.You should click the Mark for Review check box for any question that you areunsure of. In this way, at least you have answered all the questions in case yourun out of time. Unanswered questions are automatically scored as incorrect;answers that are guessed at have at least some chance of being scored as correct.If time permits, after you answer all questions you can revisit each question thatyou have marked for review. This strategy also enables you to possibly gain someinsight into questions that you are unsure of by picking up some clues from theother questions on the exam.

Some people prefer to read over the exam completely before answering the trickier ques-tions; sometimes, information supplied in later questions sheds more light on earlier ques-tions. At other times, information you read in later questions might jog your memory aboutfacts, figures, or behavior that helps you answer earlier questions. Either way, you couldcome out ahead if you answer only those questions on the first pass that you’re absolutelyconfident about. However, be careful not to run out of time if you choose this strategy!

TIP

Fortunately, the Microsoft exam software for fixed-length and short-form testsmakes the multiple-visit approach easy to implement. At the top-left corner ofeach question is a check box that permits you to mark that question for a latervisit.

Introduction19

Here are some question-handling strategies that apply to fixed-length andshort-form tests. Use them if you have the chance:

. When returning to a question after your initial read-through, read everyword again; otherwise, your mind can miss important details. Sometimes,revisiting a question after turning your attention elsewhere lets you seesomething you missed, but the strong tendency is to see only whatyou’ve seen before. Avoid that tendency at all costs.

. If you return to a question more than twice, articulate to yourself whatyou don’t understand about the question, why answers don’t appear tomake sense, or what appears to be missing. If you chew on the subjectawhile, your subconscious might provide the missing details, or youmight notice a “trick” that points to the right answer.

As you work your way through the exam, another counter that Microsoft pro-vides will come in handy—the number of questions completed and questionsoutstanding. For fixed-length and short-form tests, it’s wise to budget your timeby making sure that you’ve completed one-quarter of the questions one-quarterof the way through the exam period and three-quarters of the questions three-quarters of the way through.

If you’re not finished when only five minutes remain, use that time to guess yourway through any remaining questions. Remember, guessing is potentially morevaluable than not answering. Blank answers are always wrong, but a guess mightturn out to be right. If you don’t have a clue about any of the remaining ques-tions, pick answers at random or choose all As, Bs, and so on. (Choosing the sameanswer for a series of question all but guarantees you’ll get most of them wrong,but it also means you’re more likely to get a small percentage of them correct.)

EXAM ALERTAt the very end of your exam period, you’re better off guessing than leaving questionsunanswered.

Question-Handling StrategiesFor those questions that have only one right answer, usually two or three of theanswers will be obviously incorrect and two of the answers will be plausible.Unless the answer leaps out at you (if it does, reread the question to look for atrick; sometimes those are the ones you’re most likely to get wrong), begin theprocess of answering by eliminating those answers that are most obviouslywrong.

20

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

You can usually immediately eliminate at least one answer out of the possiblechoices for a question because it matches one of these conditions:

. The answer does not apply to the situation.

. The answer describes a nonexistent issue, an invalid option, or an imagi-nary state.

After you eliminate all answers that are obviously wrong, you can apply yourretained knowledge to eliminate further answers. You should look for items thatsound correct but refer to actions, commands, or features that are not present ornot available in the situation that the question describes.

If you’re still faced with a blind guess among two or more potentially correctanswers, reread the question. Picture how each of the possible remaininganswers would alter the situation. Be especially sensitive to terminology; some-times the choice of words (for example, “remove” instead of “disable”) can makethe difference between a right answer and a wrong one.

You should guess at an answer only after you’ve exhausted your ability to elimi-nate answers and you are still unclear about which of the remaining possibilitiesis correct. An unanswered question offers you no points, but guessing gives youat least some chance of getting a question right; just don’t be too hasty whenmaking a blind guess.

Numerous questions assume that the default behavior of a particular utility is ineffect. If you know the defaults and understand what they mean, this knowledgewill help you cut through many of the trickier questions. Simple “final” actionsmight be critical as well. If you must restart a utility before proposed changestake effect, a correct answer might require this step as well.

Mastering the Test-Taking MindsetIn the final analysis, knowledge breeds confidence, and confidence breeds suc-cess. If you study the materials in this book carefully and review all the practicequestions at the end of each chapter, you should become aware of the areaswhere you need additional learning and study.

After you’ve worked your way through the book, take the practice exams in theback of the book. Taking these tests provides a reality check and helps you iden-tify areas to study further. Make sure you follow up and review materials relat-ed to the questions you miss on the practice exams before scheduling a realexam. Don’t schedule your exam appointment until after you’ve thoroughly

Introduction21

studied the material and you feel comfortable with the whole scope of the prac-tice exams. You should score 80% or better on the practice exams before pro-ceeding to the real thing. (Otherwise, obtain some additional practice tests sothat you can keep trying until you hit this magic number.)

If you take a practice exam and don’t get at least 80% of the questions correct, keep prac-ticing. Microsoft provides links to practice-exam providers and also self-assessmentexams at http://www.microsoft.com/learning/mcpexams/prepare/default.asp.

TIP

Armed with the information in this book and with the determination to augmentyour knowledge, you should be able to pass the certification exam. However,you need to work at it, or you’ll spend the exam fee more than once before youfinally pass. If you prepare seriously, you should do well.

The next section covers other sources that you can use to prepare for Microsoftcertification exams.

Additional ResourcesA good source of information about Microsoft certification exams comes fromMicrosoft itself. Because its products and technologies—and the exams that gowith them—change frequently, the best place to go for exam-related informa-tion is online.

Microsoft offers training, certification, and other learning-related informationand links at the http://www.microsoft.com/learning web address. If you haven’talready visited the Microsoft Training and Certification website, you should doso right now. Microsoft’s Training and Certification home page resides athttp://www.microsoft.com/learning/default.mspx.

Coping with Change on the WebSooner or later, all the information we’ve shared with you about the Microsoft CertifiedProfessional pages and the other web-based resources mentioned throughout the rest ofthis book will go stale or be replaced by newer information. In some cases, the URLsyou find here might lead you to their replacements; in other cases, the URLs will gonowhere, leaving you with the dreaded “404 File not found” error message. When thathappens, don’t give up.

(continues)

22

MCTS 70-643 Exam Cram: Windows Server 2008 Applications Infrastructure, Configuring

There’s always a way to find what you want on the web if you’re willing to invest sometime and energy. Most large or complex websites—and Microsoft’s qualifies on bothcounts—offer search engines. All of Microsoft’s web pages have a Search button at thetop edge of the page. As long as you can get to Microsoft’s site (it should stay athttp://www.microsoft.com for a long time), you can use the Search button to find whatyou need.

The more focused (or specific) that you can make a search request, the more likely theresults will include information you can use. For example, you can search for the string

“training and certification”

to produce a lot of data about the subject in general, but if you’re looking for the prepa-ration guide for Exam 70-643, Windows Server 2008 Applications Infrastructure,Configuring, you’ll be more likely to get there quickly if you use a search string similar tothe following:

“Exam 70-643” AND “preparation guide”

Likewise, if you want to find the Training and Certification downloads, you should try asearch string such as this:

“training and certification” AND “download page”

Finally, you should feel free to use general search tools—such ashttp://www.google.com, http://www.yahoo.com, http://www.excite.com, andhttp://www.ask.com—to look for related information. Although Microsoft offers greatinformation about its certification exams online, there are plenty of third-party sources ofinformation and assistance that need not follow Microsoft’s party line. Therefore, if youcan’t find something where the book says it lives, you should intensify your search.

Thanks for making this Exam Cram book a pivotal part of your certificationstudy plan; best of luck on becoming certified!

(continued)

Techniques/concepts you’ll need to master:

✓ Virtual Disk Specification (VDS)

✓ IDE Drives

✓ SCSI Drives

✓ Redundant Arrays ofInexpensive Disks (RAID)

✓ network-attached storage (NAS)

✓ storage area network (SAN)

✓ iSCSI

✓ fibre channel

✓ Storage Manager

✓ iSCSI initiator

✓ partition

✓ Master Boot Record (MBR)

✓ GUID partition table (GPT)

✓ basic disks

✓ dynamic disks

✓ diskpart.exe command

✓ simple volumes

✓ spanned volumes

✓ striped volumes

✓ mirrored volumes

✓ RAID-5 volumes

✓ mount points

✓ Connect to a NAS and SAN,using Windows Server 2008.

✓ Use Storage Explorer to viewand manage Fibre Channel andISCSI Fabrics.

✓ Manage disks using the DiskManagement console anddiskpart.exe command.

✓ Enable and configure RAID,using Windows Server 2008.

3C H A P T E R T H R E E

Windows Server 2008Storage

Terms you’ll need to understand:

108

Chapter 3: Windows Server 2008 Storage

When working with Windows, you have to work with disks. Although simpleservers have you install Windows Server 2008 on a local IDE (parallel and seri-al) or SCSI hard drive, more complex systems may use an attached remote com-puter storage device such as a storage area network (SAN) or network-attachedstorage (NAS). Therefore, you need to know what options are available and howto configure a server’s physical and virtual disk drives so that the server can meetthe needs of network applications while providing reliability.

The Virtual Disk Specification (VDS) protocol provides a mechanism for remoteconfiguration of disks, partitions, volumes, and iSCSI initiators on a server.Through the VDS protocol, a client can change the configuration of disks intopartitions, partitions into volumes, and volumes into file systems. In the VDSprotocol, two entities are involved: the server whose storage is configured andthe client who needs to change the server storage configuration.

IDE and SCSI DrivesToday’s hard drives are either integrated drive electronics (IDE) or small com-puter system interface (SCSI, pronounced “skuzzy”) drives. IDE drives aredesigned as fast, low-cost drives. Traditional IDE drives were based on the par-allel AT attachment (ATA) standard that used a parallel 40-pin connector.Today’s IDE drives follow the serial ATA standard (SATA), which uses a connec-tor that is attached with only four wires and a smaller power connector.Although the serial ATA uses fewer wires/connectors, it provides faster through-put then parallel ATA IDE drives.

Servers and high-performance workstations typically use SCSI drives. SCSIdrives typically offer faster performance and throughput than IDE drives andSCSI drives support a larger number of drives to be attached through the sameinterface.

Redundant Arrays of InexpensiveDisks (RAID)To help with data protection and system reliability, there are redundant arrays ofinexpensive disks (RAID) that use two or more drives in combination to create afault tolerance system to protect against physical hard drive failure and toincrease hard drive performance. A RAID can be accomplished with either hard-ware or software and is usually used in network servers. Hardware RAID offersbetter performance and is transparent to the operating system. However, it costs

Redundant Arrays of Inexpensive Disks (RAID)109

more to implement because you need a RAID controller. Software RAID isinexpensive and easy to configure because it has no special hardware require-ments other than multiple disks.

There are several levels of RAID. The first one is RAID 0. RAID 0 stripes dataacross all drives. With striping, all available hard drives are combined into a sin-gle large virtual file system, with the file system’s blocks arrayed so they arespread evenly across all the drives. For example, if you have three 500MB harddrives, RAID 0 provides for a 1.5GB virtual hard drive. When you store files,they are written across all three drives. When a large file is written, a part of itmay be written to the first drive, the next chunk to the second drive, more to thethird drive, and perhaps more wrapping back to the first drive to start thesequence again. Unfortunately, with RAID 0 there is no parity control or faulttolerance, so it really is not a true form of RAID. If one drive fails, you lose alldata on the array. However, RAID 0 does have several advantages because it hasincreased performance through load balancing.

A common RAID used in networked PCs and servers is RAID 1, known as disk-mirroring. Disk-mirroring copies a partition onto a second hard drive. As infor-mation is written, it is written to both hard drives simultaneously. If one of thehard drives fails, the PC still functions because it can access the other hard drive.You can then replace the failed drive, and data is copied from the remaininggood drive to the replaced drive.

NOTEThis book focuses on RAID 0, 1, and 5 because that is the software RAID that is support-ed by Windows Server 2008. There are other levels of RAID, but RAID 0, 1, and 5 are themost popular and are the only software RAID supported by Windows Server 2008.

Another common RAID is RAID 5 (sometimes referred to as striped volumewith parity), which is similar to striping, except one of the hard drives is used forparity (error-correction) to provide fault tolerance. To increase performance,the error-correction is spread across all hard drives in the array to avoid havingone drive do all the work in calculating the parity bits. If one drive fails, you stillkeep working because the missing data can be filled in by doing parity calcula-tions with the remaining drives. When the failed drive is replaced, the missinginformation is rebuilt. However, if two drives fail, you do loose all data on thearray. RAID-5 has better performance than RAID 1. RAID 5 usually requires atleast three drives, with more preferable. If you have 3×500GB drives, you willhave 2×500GB=1000GB of disk space because one of the drives must be used forparity. If you have 6×500GB drives, you have 5×500GB=2500GB of disk space.

110

Chapter 3: Windows Server 2008 Storage

RAID can be implemented through the use of a hardware RAID controller orthrough software. Windows Server 2003 and Windows Server 2008 offers soft-ware RAID that supports RAID 0, RAID 1, and RAID 5. Typically, for betterperformance and reliability, it is recommended that you use hardware RAID.

Network-Attached Storage (NAS) andStorage Area Networks (SAN)Network-attached storage (NAS) is a file-level computer data storage device thatis connected to a computer network to provide shared drives or folders. To makeNAS fault tolerant, NAS systems usually contain one or more hard disks, oftenarranged as RAIDs. NAS units also usually have a web interface as opposed tokeyboard/video/mouse.

A storage area network (SAN) is an architecture that attaches remote computer stor-age devices (such as disk arrays, tape libraries, and optical jukeboxes) to servers insuch a way that, to the operating system, the devices appear as locally attached.They are typically used in larger organizations where the SAN acts as a centraldisk repository that services multiple servers and network applications. The SANusually contains multiple hard drives that use RAID or other technology to makethe system redundant against drive failure and to offer high performance.

Most SANs use the SCSI protocol for communication between servers and diskdrive devices. But instead of using the same SCSI interface used in local harddrives, it uses network interfaces, such as

. Fibre Channel

. iSCSI

A fabric is a network topology where devices are connected to each otherthrough one or more high-efficiency data paths. In the case of a Fibre Channelfabric, the network includes one or more Fibre Channel switches that enableservers and storage devices to connect to each other through virtual point-to-point connections. For iSCSI fabrics, the network includes one or more InternetStorage Name Service (iSNS) servers that provide discoverability and partition-ing of resources.

Fibre ChannelFibre Channel is a gigabit-speed network technology primarily used for storagenetworking. Fibre Channel is standardized in the T11 Technical Committee of

Network-Attached Storage (NAS) and Storage Area Networks (SAN)111

the InterNational Committee for Information Technology Standards(INCITS), an American National Standards Institute (ANSI)–accredited stan-dards committee. Despite its name, Fibre Channel signaling can run on bothtwisted pair copper wire and fiber-optic cables. Fibre Channel Protocol (FCP)is the interface protocol of SCSI on the Fibre Channel.

In a Fibre Channel switched fabric (FC-SW), Fibre Channel switches connectdevices together. When a host or device communicates with another host ordevice, the source and target create a point-to-point connection between them-selves and communicate directly with each other. The fabric itself routes datafrom the source to the target. In an FC-SW, the media is not shared. Therefore,any device can communicate with any other device, assuming it is not busy, andcommunication occurs at full bus speed regardless of whether other devices andhosts are communicating at the same time.

A port in Fibre Channel is any entity that actively communicates over the net-work. Port is usually implemented in a device such as disk storage, an HBA ona server, or a Fibre Channel switch. There are three major Fibre Channeltopologies, describing how a number of ports are connected together:

. Point-to-Point (FC-P2P): Two devices are connected back to back.This is the simplest topology, with limited connectivity.

. Arbitrated loop (FC-AL): In this design, all devices are in a loop orring, similar to token ring networking. Adding or removing a devicefrom the loop causes all activity on the loop to be interrupted. The fail-ure of one device causes a break in the ring. Fibre Channel hubs exist toconnect multiple devices together and may bypass failed ports. A loopmay also be made by cabling each port to the next in a ring. A minimalloop containing only two ports, while appearing to be similar to FC-P2P,differs considerably in terms of the protocol.

. Switched fabric (FC-SW): All devices or loops of devices are connectedto Fibre Channel switches, similar conceptually to modern Ethernetimplementations. The switches manage the state of the fabric, providingoptimized interconnections.

When a host or device is powered on, it must first log in to the fabric. Thisenables the device to determine the type of fabric (a fabric supports a specific setof characteristics) and provides a fabric address to a host or device. A given hostor device continues to use the same fabric address while it is logged on to the fab-ric; the fabric address is guaranteed to be unique for that fabric. For a host ordevice to communicate with another device, it must establish a connection to thatdevice before transmitting data. The switches route the packets in the fabric.

112

Chapter 3: Windows Server 2008 Storage

In a fabric topology, each device (including the HBA) is called a node. Eachnode has a fixed 64-bit worldwide name (WWN) assigned by the manufacturerand registered with the IEEE to ensure it is globally unique. A node can havemultiple ports, each with a unique 64-bit port name and 24-bit port ID. Forexample, a dual-port HBA has a single worldwide name (WWN) and two world-wide port IDs used for frame routing. When a port logs in to the fabric, it reg-isters various attributes that are stored in the fabric (usually within a switch).Zoning is a method of restricting which ports or WWN can communicate witheach other.

LUNs allow SANs to break the SAN storage down into manageable pieces. TheSAN then assigns each LUN to one or more servers in the SAN. If a LUN isnot mapped to a given server, that server cannot see or access the LUN. LUNmasking is a method of restricting which devices can view, send, and receivecommands to specific LUNs on a storage controller. You need to identify onlythe server or cluster that is to access the LUN, and then select which HBA portson that server or cluster will be used for LUN traffic.

When a server or cluster is identified, Storage Explorer automatically discoversthe available Fibre Channel HBA ports on that server or cluster. You can alsoadd ports manually by entering their World Wide Name (WWN).

iSCSIiSCSI is a protocol that enables clients to send SCSI commands over a TCP/IPnetwork using TCP port 3260. Because it uses Ethernet switches and cabling,typically Gigabit Ethernet or Fibre, it can connect a SAN to multiple serversand provide long-distance connections.

A LUN is a logical reference to a portion of a storage subsystem. A LUN cancomprise a disk, a section of a disk, a whole disk array, or a section of a disk arrayin the subsystem. Using LUNs simplifies the management of storage resourcesin your SAN because LUNs serve as logical identifiers through which you canassign access and control privileges.

Because you connect to the SAN over a network, the network adapter must bededicated to either network communication (traffic other than iSCSI) or iSCSI,not both. Therefore, if you are using iSCSI, you need two sets of network cards,one for iSCSI and one for network connections.

For a server to connect to a SAN, the server connects to a target using an iSCSIinitiator. A target defines the portals/servers (IP addresses) that can be used toconnect to the iSCSI device, as well as the security settings (if any) that the iSCSIdevice requires to authenticate the servers requesting access to its resources.

Network-Attached Storage (NAS) and Storage Area Networks (SAN)113

For a server to connect to an iSCSI SAN, the server uses an iSCSI initiator soft-ware to log on and connect to the SAN. After access is granted by the SAN, theserver can start reading and writing to all LUNs assigned to that server. Afterthe software initiator connects to a LUN, the iSCSI session emulates a SCSIhard disk so that the server treats the LUN just like any other hard drive.

Each iSCSI initiator can have one or more network adapters through whichcommunication is established. Additional network adapters provide increasedbandwidth and redundancy.

The iSCSI software can be built into the iSCSI host adapter (more commonlyknown as a Host Bus Adapter (HBA). A typical HBA is packaged as a combina-tion of a Gigabit Ethernet NIC and a SCSI bus adapter, which is what it appearsas to the operating system. The HBA contains special firmware that contains theiSCSI initiator software. Because a hardware initiator processes iSCSI and TCPprocessing and the Ethernet interrupts, performance can be increased overiSCSI initiator software running on the server.

For iSCSI initiators to find a storage device to connect to, the iSCSI initiatoruses Internet Storage Name Service (iSNS) protocol to provide both namingand resource discovery services for storage devices on the IP network. TheiSCSI initiator then uses the following to connect to the SAN:

. Hostname or IP address (for example, “iscsi.example.com”)

. Port number (for example, 3260)

. iSCSI name (for example, the IQN “iqn.2003-01.com.ibm:00.fcd0ab21.shark128”)

. An optional CHAP secret password

The iSCSI Name follows one of the following formats:

. iSCSI Qualified Name (IQN): IQN follows the format

iqn.yyyy-mm.{reversed domain name}

For example:

iqn.2001-04.com.acme:storage.tape.sys1.xyz

IQN addresses are the most common format.

. Extended Unique Identifier (EUI): EUI follows the format

eui.{EUI-64 bit address}

114

Chapter 3: Windows Server 2008 Storage

For example:

eui.02004567A425678D

EUI is provided by the IEEE Registration authority in accordance withEUI-64 standard.

. T11 Network Address Authority (NAA): NAA follows the format

naa.{NAA 64 or 128 bit identifier}

For example:

naa.52004567BA64678D

NAA is part OUI, which is provided by the IEEE Registration Authority.NAA name formats were added to iSCSI in RFC 3980, to provide com-patibility with naming conventions used in Fibre Channel and SAS stor-age technologies.

Configuring the iSCSI InitiatorsMicrosoft Windows Server 2008 includes two iSCSI Initiator software inter-faces. They are

. iSCSI Initiator applet (located in the Administrative Tools and ControlPanel)

. iscsicli command interface

EXAM ALERTFor the exam, be sure you know how to connect to and configure an iSCSI volumeusing an iSCSI initiator.

iSCSI Initiator AppletBy using an iSCSI Initiator (located in the Administrative Tools and the ControlPanel), you connect a storage array or volume of a storage array to a server andmount the array or volume as a local volume. An iSCSI initiator is the softwarecomponent residing on a server or other computer that is installed and config-ured to connect to an iSCSI target. An iSCSI target is the actual storage arrayor volume.

When you open the iSCSI Initiator program, you see the following six tabs:

. General: Enables you to rename the initiator and configure the CHAPauthentication and IPSec tunnel.

Network-Attached Storage (NAS) and Storage Area Networks (SAN)115

. Discovery: Specifies the location of the SAN and Internet StorageName Service (iSNS) servers.

. Targets: Specifies to which storage devices the server has access andallows you to log on to those devices.

. Favorite Targets: Specifies which targets reconnect each time you startyour computer.

. Volumes and Devices: Shows volumes and devices that are connectedto the server.

. RADIUS: Specifies the RADIUS server to use for authentication.

Figure 3.1 shows the Discovery tab.

1. To connect to the iSCSI array, select the Discovery tab and click AddPortal.

2. In the Add Target Portal dialog box, provide the name or IP address ofyour iSCSI array. The default communication port for iSCSI traffic is3260. If you have configured CHAP security or are using IPSec for com-munication between your client and the array, click Advanced and makenecessary configuration changes.

3. Back in the Add Target Portal dialog box, click OK to make the initialconnection to the iSCSI array.

FIGURE 3.1 The iSCSI InitiatorProperties dialog.

116

Chapter 3: Windows Server 2008 Storage

4. To see the list of available targets (volumes to connect to and mount onthe server), select the Targets tab.

5. To connect to an available target, choose the target and click Log On.

. If you want your server to connect to this volume automaticallywhen your system boots, make sure you select Automatically RestoreThis Connection When The System Boots. If you do not, you needto reconnect it manually.

. To enable high availability and to boost performance, choose EnableMulti-Path. Of course, you would need to have multiple networkadapters dedicated to the iSCSI connection to use multi-pathing(MPIO).

. If you are using CHAP or IPSec for communication with a target,click Advanced. After you are finished configuring the Log Onoptions, click OK. The target status should change to Connected(see Figure 3.2).

6. To bind the available iSCSI targets to the iSCSI startup process and assignthem to a drive letter or mount point, select the Volumes and Devices tab.Click Add and specify the drive letter or mount point. Then Click OK.

If the iSCSI volume is a new volume that has not been mounted before, when youopen the Disk Management console, it is treated as a new hard drive. At this point,you have to initialize the new drive, create a partition, and format the new volume.

iSCSICLIiSCSICLI is a command-line tool suitable for scripting the Microsoft iSCSI initia-tor service. Although some of these commands may become lengthy and complex,this enables you to access all features of iSCSI. Some of the functions include:

. iscsicli AddTarget: Creates a connection to a volume or device

. iscsicli AddPersistentDevices: To make an iSCSI device persistent

FIGURE 3.2 Log On to Target dialogbox for iSCSI.

Network-Attached Storage (NAS) and Storage Area Networks (SAN)117

. iscsicli RemovePersistentDevices: Prevents the reconnection to aspecified volume

. iscsicli ClearPersistentDevices: Removes all volumes and devicesfrom the list of persistent devices.

For more information, access the Microsoft iSCSI Software Initiator User’sGuide from Microsoft:

http://www.microsoft.com/downloads/details.aspx?familyid=12CB3C1A-15D6-4585-B385-BEFD1319F825&displaylang=en

Storage ExplorerWith Storage Explorer, you can view and manage the Fibre Channel and iSCSIfabrics that are available in your SAN. Storage Explorer can display detailedinformation about servers connected to the SAN, as well as components in thefabrics such as host bus adapters (HBA), Fibre Channel switches, and iSCSI ini-tiators and targets (see Figure 3.3).

In addition, you can also perform many administrative tasks on an iSCSI fabricincluding logging onto the iSCSI targets, configuring iSCSI security, addingiSCSI target portals, adding iSNS servers, and managing Discovery Domainsand Discovery Domain Sets.

FIGURE 3.3 The Storage Explorer dialog.

Storage Manager for SANsThe Storage Manager for SANs, a Windows Server 2008 feature, can be used tocreate and manage logical unit numbers (LUN) on both Fibre Channel andiSCSI disk storage subsystems that support Virtual Disk Service (VDS).

118

Chapter 3: Windows Server 2008 Storage

For Fibre Channel SANs, when a server or cluster is identified, StorageManager for SANs automatically discovers the available Fibre Channel HBAports on that server or cluster. You can also add ports manually by typing theirWorld Wide Name (WWN).

For iSCSI SANs, you only need to identify the server or cluster that will accessthe LUN, and Storage Manager for SANs automatically discovers the iSCSI ini-tiators on that server or cluster and lists all the available adapters for those ini-tiators. After the iSCSI initiator adapters have been discovered, you can selectwhich adapters will be used for LUN traffic.

To add and configure a server with Fibre Channel connections, follow thesesteps:

1. In the console tree for Storage Manager for SANs, click LUNManagement.

2. In the Actions pane, click Manage Server Connections.

3. In the Manage Server Connections dialog box, click Add.

4. In the Add Server dialog box, type the name or browse to the server thatyou want to add, and optionally, type a description for it.

5. Click OK. The server will now be listed in the Manage ServerConnections dialog box, with all the ports that were automatically dis-covered on it listed on the Fibre Channel Ports tab.

6. If necessary, you can add a Fibre Channel manually by clicking Add onthe Fibre Channel Ports tab and entering the WWN of the new port.Then click OK.

7. To enable Fibre Channel ports for LUN access, select a server from theserver list. Then on the Fibre Channel Ports tab, select all the ports thatyou want to enable on the selected server.

NOTEIf you enable more than one Fibre Channel port and the server is not configured to useMultipath I/O, data corruption may occur.

8. Click OK when you have finished configuring the Fibre Channel connections.

Disk Partitioning119

Storage Manager for SANs includes the Provision Storage Wizard, which youcan use to create a logical unit number (LUN) on a Fibre Channel or iSCSI diskstorage subsystem. Before you create a LUN on a storage subsystem, verify thatall the following requirements are fulfilled:

. The storage subsystem supports Virtual Disk Service (VDS).

. The VDS hardware provider for the storage subsystem is installed onyour server.

. Storage space is available on the storage subsystem.

. If the server to which you will be assigning the LUN will access theLUN through more than one Fibre Channel port or iSCSI initiator,Multipath I/O has been installed and is running on that server.

To create a LUN, select LUN Management. In the Actions pane, click CreateLUN. Then follow the steps in the Provision Storage Wizard pages.

If you create a LUN and do not choose to create a volume for it immediately byusing the Provision Storage Wizard, the disk associated with that LUN is visi-ble to the server to which you assign it, but it is offline. Before you can create apartition or volume on that disk, you must first use Disk Management orDiskPart to bring the disk online.

You can also use Storage Manager for SANs to assign a LUN to a server or clus-ter with the Assign LUN wizard. To start the Assign LUN wizard, click LUNManagement in Storage Manager, and then select the LUN you want to assignin the Results pane. Then click Assign LUN in the Actions pane.

Disk PartitioningWhen you prepare any drive or volume to be used by Windows Server 2008,you must first partition the disk and then format the disk. Partitioning is defin-ing and dividing the physical or virtual disk into logical volumes called parti-tions. Each partition functions as if it were a separate disk drive.

Windows Server 2008 supports two types of disk partitioning styles:

. Master Boot Record (MBR)

. GUID partition table (GPT)

120

Chapter 3: Windows Server 2008 Storage

MBR disks have been used as standard equipment on IBM-compatible personalcomputers since the days of MS-DOS. MBR disks support volume sizes of up totwo terabytes (TB) and allow up to four primary partitions per disk.Alternatively, MBR disks support three primary partitions, one extended parti-tion, and an unlimited number of logical drive letters.

Windows Server 2008 includes support for global unique identifier—orGUID—Partition Table (GPT) disks in cluster storage. GPT disks were intro-duced with computers equipped with Intel Itanium-based processors and theExtensible Firmware Interface (EFI) as an alternative to a Basic Input/OutputSystem (BIOS) as the interface between the computer’s hardware devices, itsfirmware, and the operating system. GPT provides a more flexible mechanismfor partitioning disks than the older MBR partitioning scheme that has beencommon to PCs. GPT disks support volume sizes up to 18 exabytes (EB) andcan store up to 128 partitions on each disk. Eighteen exabytes are roughly equiv-alent to 18 billion gigabytes. Critical system files are stored on GPT partitions,and GPT disks store a duplicate set of partition tables to ensure that partition-ing information is retained.

Disk Storage ManagementWindows Server 2008 supports two types of hard disk storage: basic and dynam-ic. All disks begin as basic disks until a server administrator converts them todynamic status, one physical disk at a time. The biggest advantage that dynamicdisks offer when compared to basic disks is that you can create software-basedfault-tolerant volumes via the operating system from the volumes stored ondynamic disks (mirrored volumes/RAID 1 and Striping with Parity/RAID-5) vol-umes. Of course, you can always implement a hardware RAID solution by usinga RAID controller and the disks can retain their basic status, or they can be con-verted to dynamic status under Windows Server 2008.

Basic DisksA basic disk under Windows Server 2008 is essentially the same as the disk con-figuration under earlier versions of Windows: It is a physical disk with primaryand extended partitions. Prior to Windows 2000, Microsoft did not call disks basicbecause that was the only type of disk available. There were no dynamic disks. Aslong as you use the File Allocation Table (FAT or FAT32) file system, WindowsVista, Windows XP, Windows 2000, Windows NT, Windows 9x, and the MS-DOS operating systems can access basic disks. You can create up to three primarypartitions and one extended partition on a basic disk of four primary partitions.

Disk Storage Management121

You can create a single extended partition with logical drives on a basic disk. Basicdisks store their configuration information in the Partition Table, which is storedon the first sector of each hard disk. The configuration of a basic disk consists ofthe partition information on the disk.

Dynamic DisksA Windows Server 2008 dynamic disk is a physical disk configuration that does notuse partitions or logical drives, and the MBR is not used. Instead, the basic parti-tion table is modified and any partition table entries from the MBR are added aspart of the Logical Disk Manager (LDR) database that stores dynamic disk infor-mation at the end of each dynamic disk. Dynamic disks can be divided into as manyas 2,000 separate volumes, but you should limit the number of volumes to 32 foreach dynamic disk to avoid slow boot time performance.

Dynamic disks do not have the same limitations as basic disks. For example, youcan extend a dynamic disk “on the fly” without requiring a reboot. Dynamicdisks are associated with disk groups, which are disks that are managed as a col-lection. This managed collection of disks helps organize dynamic disks. Alldynamic disks in a computer are members of the same disk group. Each disk ina disk group stores replicas of the same configuration data. This configurationdata is stored in the 1MB LDR region at the end of each dynamic disk.

Dynamic disks support five types of volumes: simple, spanned, mirrored,striped, and RAID-5. You can extend a volume on a dynamic disk. Dynamicdisks can contain a virtually unlimited number of volumes, so you are notrestricted to four volumes per disk as you are with basic disks. Regardless of thetype of file system, only computers running Windows Vista (Ultimate andBusiness Editions), Windows XP Professional, Windows 2000 Professional orServer, Windows Server 2003, or Windows Server 2008 can directly accessdynamic volumes on hard drives that are physically connected to the computer.However, computers running other operating systems can access dynamic vol-umes remotely when they connect to shared folders over the network.

Managing Basic Disks and Dynamic DisksWhen you install Windows Server 2008, the system automatically configuresthe existing hard disks as basic NTFS disks, unless they have been configured asdynamic from a previous installation. Windows Server 2008 does not supportdynamic disks on mobile PCs (laptops or notebooks). If you’re using an olderdesktop machine that is not Advanced Configuration and Power Interface(ACPI) compliant, the Convert to Dynamic Disk option is not available.

122

Chapter 3: Windows Server 2008 Storage

Dynamic disks have some additional limitations. You can install WindowsServer 2008 on a dynamic volume that you converted from a basic disk, but youcannot extend either the system or the boot volume on a dynamic disk. Anytroubleshooting tools that cannot read the dynamic disk management databasework only on basic disks.

EXAM ALERTDynamic disks are supported only on computers that use the Small Computer SystemInterface (SCSI), Fibre Channel, Serial Storage Architecture (SSA), or Integrated DriveElectronics (IDE). Portable computers, removable disks, and disks connected viaUniversal Serial Bus (USB) or FireWire (IEEE 1394) interfaces are not supported fordynamic storage. Dynamic disks are also not supported on hard drives with a sectorsize of less than 512 bytes.

You can format partitions with the FAT16, FAT32, or NTFS on a basic or adynamic disk. However, you can format a dynamic volume as NTFS only fromthe Disk Management console. You must use Windows Server 2008 Explorer toformat a dynamic volume as FAT or FAT32.

EXAM ALERTWindows Server does not support formatting partitions or volumes larger than 32GB asFAT32. Partitions or volumes larger than 32GB that have been upgraded from previousoperating systems can be mounted and used under Windows Server 2008. Partitionsor volumes larger than 32GB that have been created by third-party utilities can also bemounted and used under Windows Server 2008.

When you install a fresh copy of Windows Server 2008 or when you perform anupgrade installation from Windows NT 4.0 Server with SP5, Windows 2000, orWindows Server 2003, the computer system defaults to basic disk storage. Oneor more of the disk drives could already be configured as dynamic if you upgrad-ed from Windows 2000 Server, Windows Server 2003, or Windows Server 2008(or if you import a “foreign disk” from a Windows 2000 Server or from anoth-er Windows Server 2003 computer). A disk is considered foreign when youmove it from one computer to another computer, until you select the Importoption for it in the Disk Management console.

Converting Basic Disks to Dynamic DisksFrom the graphical user interface (GUI), you use the Windows Server 2008Disk Management console (an MMC snap-in) to upgrade a basic disk to adynamic disk. The Disk Management snap-in is located in the Computer

Disk Storage Management123

Management console and the Server Management console. You must be a mem-ber of the local Administrators group or the backup operators group, or else theproper authority must be delegated to you if you are working within an ActiveDirectory environment to make any changes to the computer’s disk manage-ment configuration.

For the conversion to succeed, any disks to be converted must contain at least1MB of unallocated space. Disk Management automatically reserves this spacewhen creating partitions or volumes on a disk, but disks with partitions or vol-umes created by other operating systems might not have this space available.(This space can exist even if it is not visible in Disk Management.) WindowsServer 2008 requires this minimal amount of disk space to store the dynamicdatabase, which the operating system that created it maintains. Before you con-vert any disks, close any programs that are running on those disks. After youconvert a disk to dynamic, remember that you can have only one operating sys-tem that is bootable on each dynamic disk!

To convert a basic disk to a dynamic disk from the Disk Management console,follow these steps:

1. Open the Disk Management console.

2. Right-click the basic disk that you want to convert to a dynamic disk andclick Convert to Dynamic Disk.

When you upgrade an empty basic disk to a dynamic disk, you do not need toreboot. However, if you convert a basic disk that already has partitions on it, orif the basic disk contains the system or boot partitions, you must restart yourcomputer for the change to take effect.

NOTEYou can mount and dismount volumes from the command line with the mountvol.execommand. On basic disks, if you type mountvol x: /p, where x: represents the volume’s drive letter, you can dismount a volume and take it offline. Unfortunately, the /pparameter is not supported on dynamic disks. The command mountvol x: /l displaysthe specified drive letter’s volume ID. By using the syntax mountvol x: volume_ID,you can assign a drive letter to the volume and remount it to bring it back online. Forexample, the command mountvol S: \\?\Volume{55e769f0-40d5-11d4-b223-806d6172696f}\ would assign drive letter S: to the volume ID specified. You canalso use Disk Management to mount and dismount volumes from the GUI. You can mountand dismount volumes by right-clicking a volume and selecting Change Drive Letter andPaths. By removing the drive letter and any other paths (mount points) for the volume, youtake the volume offline.

124

Chapter 3: Windows Server 2008 Storage

To convert a basic disk to a dynamic disk from the Windows Server 2008 com-mand line:

1. Open a command prompt window, type diskpart, and press Enter.

2. Type commands or help to view a list of available commands.

3. Type select disk 0 to select the first hard disk (select disk 1 toselect the second hard disk, and so on) and press Enter.

4. Type convert dynamic and press Enter.

5. Type exit to quit the diskpart.exe tool and then restart the computerto have the new configuration take effect.

When you convert a basic disk to a dynamic disk, any existing partitions on thebasic disk become simple volumes on the dynamic disk. Any existing mirror sets,stripe sets, stripe sets with parity, or volume sets become mirrored volumes,striped volumes, dynamic RAID-5 volumes, or spanned volumes, respectively. Afteryou convert a basic disk to a dynamic disk, you cannot change the volumes backto partitions. Instead, you must first delete all dynamic volumes on the disk,right-click the disk in Disk Management, and then select the Convert to BasicDisk option.

NOTEConverting to a dynamic disk is a one-way process. Yes, you can convert a dynamic diskback to a basic disk, but you’ll lose all your data. Obviously, this loss is a major consider-ation! If you find yourself needing to do it, first back up your data and then you can deleteall the volumes on the disk, convert the disk to basic, and restore your data.

NOTEWhen you upgrade or convert a basic disk to a dynamic disk, at least 1MB of free spacemust be available for the dynamic disk database. Under normal circumstances, thisrequirement should not be a problem.

Because the conversion process from basic to dynamic is per physical disk, a diskhas all dynamic volumes or all basic partitions; you won’t see both on the samephysical disk. Remember, you do not need to restart your computer when youupgrade from an empty basic to a dynamic disk from the Disk Management con-sole. However, you do have to restart your computer if you use thediskpart.exe command-line tool for the conversion; if you convert a disk con-taining the system volume, boot volume, or a volume with an active paging file;or if the disk contains any existing volumes or partitions.

Disk Storage Management125

Converting Dynamic Disks Back to Basic DisksYou must remove all volumes (and therefore all data) from a dynamic disk beforeyou can change it back to a basic disk. After you convert a dynamic disk back toa basic disk, you can create only partitions and logical drives on that disk. Afterbeing converted from a basic disk, a dynamic disk can no longer contain parti-tions or logical drives, nor can older versions of Windows before Windows 2000access the dynamic disk. To revert a dynamic disk to a basic disk, follow thesesteps:

1. Back up the data on the dynamic disk.

2. Open Disk Management.

3. Delete all the volumes on the disk.

4. Right-click the dynamic disk that you want to change back to a basic diskand then click Convert to Basic Disk.

5. Restore the data to the newly converted basic disk.

Converting Basic Disks to GPT DisksYou can change a disk from MBR to GPT partition style as long as the disk doesnot contain any partitions or volumes. You cannot use the GPT partition styleon removable media, or on cluster disks that are connected to shared SCSI orFibre Channel buses that are used by the Cluster service.

Take these steps to change a master boot record disk into a GUID partitiontable disk within the Windows interface:

1. Back up or move the data on the basic MBR disk you want to convertinto a GPT disk.

2. If the disk contains any partitions or volumes, right-click any volumes onthe disk and then click Delete Partition or Delete Volume.

3. Right-click the MBR disk that you want to change into a GPT disk andthen click Convert to GPT Disk.

Take these steps to change a master boot record disk into a GUID partitiontable disk from a command line:

1. Back up or move the data on the basic MBR disk you want to convertinto a GPT disk.

2. Open a command prompt and type diskpart. If the disk does not con-tain any partitions or volumes, skip to step 6.

126

Chapter 3: Windows Server 2008 Storage

3. At the diskpart prompt, type list volume. Make note of the volumenumber you want to delete.

4. At the diskpart prompt, type select volume <volumenumber>.

5. At the diskpart prompt, type delete volume.

6. At the diskpart prompt, type list disk. Make note of the disk numberof the disk that you want to convert to a GPT disk.

7. At the diskpart prompt, type select disk <disknumber>.

8. At the diskpart prompt, type convert gpt.

Converting GPT Disks to Basic DisksYou can change a disk from GPT to MBR partition system as long as the disk isempty and contains no volumes. If it has data, you must back up your data andthen delete all partitions or volumes before converting the disk.

To change a GUID partition table disk into a master boot record disk within theWindows interface, follow these steps:

1. Back up or move all volumes on the basic GPT disk you want to convertinto a MBR disk.

2. If the disk contains any partitions or volumes, right-click any volumes onthe disk and then click Delete Volume.

3. Right-click the GPT disk that you want to change into an MBR disk andthen click Convert to MBR disk.

To change a GUID partition table disk into a master boot record disk using thecommand line, follow these steps:

1. Back up or move all volumes on the basic GPT disk you want to convertinto a MBR disk.

2. Open a command prompt and type diskpart. If the disk does not con-tain any partitions or volumes, skip steps 3-5.

3. At the diskpart prompt, type list volume. Make note of the volumenumber you want to delete.

4. At the diskpart prompt, type select volume <volumenumber>.

5. At the diskpart prompt, type delete volume.

6. At the diskpart prompt, type list disk. Make note of the disk numberof the disk that you want to convert to a GPT disk.

Disk Storage Management127

7. At the diskpart prompt, type select disk <disknumber>.

8. At the diskpart prompt, type convert mbr.

Moving Disks to Another ComputerTo move disks to another computer, follow these steps:

1. Before you disconnect the disks, use Disk Management on the sourcecomputer and make sure that the status of all volumes on each of thedisks is healthy. For any volumes that are not healthy, repair the volumesbefore you move the disks.

2. If the disks are dynamic, right-click each disk and select Remove Disk.

3. Power off the computer, remove the physical disks, and then install thephysical disks on the target computer.

4. When you restart the target computer, the Found New Hardware dialogbox should appear. If not, click Start, Control Panel, Add Hardware tolaunch the Add Hardware Wizard. Use the wizard to properly install thedisks on the computer.

5. Open Disk Management on the target computer.

6. Click Action, Rescan Disks from the menu bar.

7. For any disks that are labeled Foreign, right-click them, click ImportForeign Disks, and then follow the instructions provided by the DiskManagement console.

CAUTIONYou can move dynamic disks only to Windows Server 2008, Windows Server 2003,Windows 2000, or Windows XP Professional computers.

Reactivating a Missing or Offline DiskA dynamic disk can become “missing” or “offline” when it is somehow damaged,it suddenly loses power, or it has its data cable disconnected while still poweredon. Unfortunately, you can reactivate only dynamic disks—not basic disks.

Follow these steps to reactivate a missing or offline dynamic disk:

1. Launch the Disk Management console.

2. Right-click the disk marked Missing or Offline and then select theReactivate Disk option.

128

Chapter 3: Windows Server 2008 Storage

3. After the disk is reactivated, the disk should be labeled as “online.”

4. Exit from the Disk Management MMC.

Basic PartitionsYou can create primary partitions, extended partitions, and logical drives only onbasic disks. Partitions and logical drives can reside only on basic disks. You cancreate up to four primary partitions on a basic disk or up to three primary par-titions and one extended partition. You can use the free space in an extendedpartition to create multiple logical drives. You must be a member of the localAdministrators group or the backup operators group, or else the proper author-ity must be delegated to you (if you are working within an Active Directory envi-ronment) to create, modify, or delete basic volumes.

NOTEYou can extend a basic partition with the diskpart.exe command-line utility, but itmust be formatted as NTFS, it must be adjacent to contiguous unallocated space on thesame physical disk, and it can be extended onto only unallocated space that resides onthe same physical disk.

To create or delete a partition or logical drive, you can use the diskpart.execommand-line tool or the GUI and perform the following steps:

1. Open the Disk Management console.

2. Perform one of the following options:

. Right-click an unallocated region of a basic disk and click NewPartition.

. Right-click an area of free space within an extended partition andclick New Logical Drive.

. Right-click a partition or logical drive and select Delete Partition toremove that partition or logical drive. Click Yes to confirm the deletion.

3. When you choose to create a new partition or logical drive, the NewPartition Wizard appears. Click Next to continue.

4. Click Primary Partition, Extended Partition, or Logical Drive andanswer the prompts regarding disk space allocation and so on as request-ed by the wizard to finish the process.

Dynamic Volumes129

You must first create an extended partition before you can create a new logicaldrive, if no extended partition exists already. If you choose to delete a partition,all data on the deleted partition or logical drive is lost. You cannot recover delet-ed partitions or logical drives. You cannot delete the system partition, boot par-tition, or any partition that contains an active paging file. The operating systemuses one or more paging files on disk as virtual memory that can be swapped intoand out of the computer’s physical random access memory (RAM) as the sys-tem’s load and volume of data dictate.

CAUTIONWindows Server 2008 requires that you delete all logical drives and any other partitionsthat have not been assigned a drive letter within an extended partition before you deletethe extended partition itself.

Dynamic VolumesWith dynamic disks, you are no longer limited to four volumes per disk (as youare with basic disks). You can install Windows Server 2008 onto a dynamic vol-ume; however, these volumes must contain the partition table (which means thatthese volumes must have been converted from basic to dynamic under WindowsServer 2008, Windows Server 2003, Windows XP Professional, or Windows2000). You cannot install Windows Server 2008 onto dynamic volumes that youcreated directly from unallocated space. Only computers running Windows XPProfessional, the Windows 2000 family of operating systems, the WindowsServer 2003 family of products, or the Windows Server 2008 can access dynam-ic volumes. The five types of dynamic volumes are

. Simple

. Spanned

. Mirrored

. Striped

. RAID-5

Windows Server 2008 supports all five dynamic volume types. You must be amember of the local Administrators group or the backup operators group, or youmust have the proper permissions delegated to you (if you are working within anActive Directory environment) to create, modify, or delete dynamic volumes.

130

Chapter 3: Windows Server 2008 Storage

Simple VolumesA simple volume consists of disk space on a single physical disk. It can consist ofa single area on a disk or multiple areas on the same disk that are linked togeth-er. To create a simple volume, follow these steps:

1. Open Disk Management.

2. Right-click the unallocated space on the dynamic disk where you want tocreate the simple volume and then click New Volume.

3. Using the New Volume Wizard, click Next, click Simple, and then fol-low the instructions and answer the questions asked by the wizard.

Here are some guidelines about simple volumes:

. You can create simple volumes on dynamic disks only.

. Simple volumes are not fault tolerant.

. Simple volumes cannot contain partitions or logical drives.

. Neither MS-DOS nor Windows operating systems other than WindowsServer 2008, Windows Server 2003, Windows XP Professional, andWindows 2000 can access simple volumes.

Spanned VolumesA spanned volume consists of disk space from more than one physical disk. Youcan add more space to a spanned volume by extending it at any time. To createa spanned volume, follow these steps:

1. Open Disk Management.

CAUTIONWhen you create dynamic volumes on dynamic disks using the Disk Management con-sole, you only have the option of formatting new dynamic volumes with the NTFS file sys-tem. However, you can use the format.exe command at a command prompt windowto format a dynamic volume using the FAT or FAT32 file system. For example, you cancreate a new dynamic volume using Disk Management; do not format the drive, and besure to assign a drive letter to it. Then, at a command prompt, type format x:/fs:fat32, where x: represents the drive letter and fat32 represents the file systemthat you want to format on the volume. You can alternatively specify fat or ntfs as thefile system when you use the format command.

Dynamic Volumes131

2. Right-click the unallocated space on one of the dynamic disks where youwant to create the spanned volume and then click New Volume.

3. Using the New Volume Wizard, click Next, click Spanned, and then fol-low the instructions and answer the questions asked by the wizard.

Here are some guidelines about spanned volumes:

. You can create spanned volumes on dynamic disks only.

. You need at least two dynamic disks to create a spanned volume.

. You can extend a spanned volume onto a maximum of 32 dynamic disks.

. Spanned volumes cannot be mirrored or striped.

. Spanned volumes are not fault tolerant.

Extending Simple or Spanned VolumesSimple volumes are the most basic volumes on dynamic disks. If you extend asimple volume to another dynamic disk, it automatically becomes a spanned vol-ume. You can extend a simple volume to make it a spanned volume, and you canalso further extend a spanned volume to add disk storage capacity to the volume.You cannot extend a mirrored volume. Take these steps to extend a simple or aspanned volume:

1. Open Disk Management.

2. Right-click the simple or spanned volume you want to extend, clickExtend Volume, and then follow the instructions and answer the ques-tions asked by the Extend Volume Wizard.

You should be aware of the many rules about extending a simple or a spannedvolume:

. You can extend a volume only if it contains no file system or if it is for-matted using NTFS. You cannot extend volumes formatted using FAT orFAT32.

. After a volume is extended onto multiple disks (spanned), you cannotmirror the volume, nor can you make it into a striped volume or aRAID-5 volume.

. You cannot extend boot volumes, system volumes, striped volumes, mir-rored volumes, or RAID-5 volumes.

132

Chapter 3: Windows Server 2008 Storage

. After a spanned volume is extended, no portion of it can be deleted with-out the entire spanned volume being deleted.

. You can extend a simple or a spanned volume only if the volume was cre-ated as a dynamic volume under Windows Server 2003 or WindowsServer 2008. You cannot extend a simple or spanned volume that wasoriginally converted from basic to dynamic under Windows 2000 orWindows XP Professional.

. You can extend simple and spanned volumes on dynamic disks onto amaximum of 32 dynamic disks.

. Spanned volumes write data to subsequent disks only as each disk volumefills up. Therefore, a spanned volume writes data to physical disk 0 untilit fills up, then it writes to physical disk 1 until its available space is full,then it writes to physical disk 2, and so on. However, if just one disk failsas part of the spanned volume—all the data contained on that spannedvolume is lost.

Striped VolumesA striped volume stores data in stripes on two or more physical disks. Data in astriped volume is allocated alternately and evenly (in stripes) to the disks con-tained within the striped volume. Striped volumes can substantially improve thespeed of access to the data on disk. Striped volumes are often referred to asRAID-0; this configuration tends to enhance performance, but it is not fault tol-erant. To create a striped volume, follow these steps:

1. Open Disk Management.

2. Right-click unallocated space on one of the dynamic disks where youwant to create the striped volume and select New Volume from themenu that appears.

3. Using the New Volume Wizard, click Next, select Striped, and followthe instructions and answer the questions asked by the wizard.

Here are some guidelines about striped volumes:

. You need at least two physical dynamic disks to create a striped volume.

. You can create a striped volume onto a maximum of 32 disks.

. Striped volumes are not fault tolerant.

Dynamic Volumes133

. For increased volume capacity, select disks that contain similar amountsof available disk space. A striped volume’s capacity is limited to the spaceavailable on the disk with the smallest amount of available space.

. Whenever possible, use disks that are the same model and from the samemanufacturer.

. Striped volumes cannot be extended or mirrored. If you need to make astriped volume larger by adding another disk, you first have to delete thevolume and then re-create it.

Mirrored Volumes and RAID-5 VolumesYou can create mirrored volumes and RAID-5 volumes only on dynamic disksrunning on Windows Server 2008, Windows Server 2003, or Windows 2000Server computers. Both mirrored volumes and RAID-5 volumes are consideredfault tolerant because these configurations can handle a single disk failure andstill function normally. Mirrored volumes and RAID-5 volumes both requirethat an equal amount of disk space be available on each disk that will be a partof these volumes. A mirrored volume must use two physical disks—no more andno fewer than two physical hard disk drives. A RAID-5 volume must use at leastthree physical hard disks up to a maximum of 32 physical disks.

Many network administrators and consultants agree that hardware-based fault-tolerant solutions are more robust and reliable than software-based fault-tolerant configurations. By installing one or more RAID controller adaptercards into a server, you can set up several different types of hardware fault tol-erance, such as mirroring, RAID-5, RAID 10 (mirrored volumes that are part ofa striped array set), and RAID 0+1 (striped volumes that are part of a mirroredset). When you use hardware RAID, you can retain basic disks or you can con-vert disks to dynamic; hardware RAID is hidden to Windows Server 2008. Ofcourse, it’s less expensive to implement a software solution, such as setting upmirrored volumes or RAID-5 volumes using the Disk Management console inWindows Server 2008, but often the improved performance, reliability, and flex-ibility of hardware-based RAID far outweighs its extra cost.

Working with Mirrored VolumesA mirrored volume uses volumes stored on two separate physical disks to “mirror”(write) the data onto both disks simultaneously and redundantly. This configura-tion is also referred to as RAID-1. If one of the disks in the mirrored configura-tion fails, Windows Server 2008 writes an event into the system log of the EventViewer. The system functions normally (unless the second disk fails) until the

134

Chapter 3: Windows Server 2008 Storage

failed disk is replaced and then the volume can be mirrored again. Mirrored vol-umes cost you 50% of your available storage space because of the built-in redun-dancy. If you mirror two 70GB disks, you are left with just 70GB of space ratherthan 140GB.

You can make mirrored volumes more robust by installing a separate hard diskcontroller for each disk; technically, this is known as disk duplexing. Diskduplexing is better than disk mirroring because you alleviate the single point offailure by having one controller for each disk. Under Windows Server 2008, diskduplexing is still referred to as disk mirroring. You can create mirrored volumesonly by using dynamic disks. To create a new empty mirrored volume from unal-located space, follow these steps:

1. Open Disk Management.

2. Right-click an area of unallocated space on a dynamic disk and selectNew Volume.

3. Click Next for the New Volume Wizard welcome window.

4. Click Mirrored as the volume type option and click Next.

5. Select one of the available dynamic disks and click Add.

6. Enter the amount of storage space to be used (in MB) for this mirroredvolume, up to the maximum available space on the first disk that youselected, and then click Next.

7. Assign the new volume a drive letter, mount the volume in an emptyNTFS folder, or choose not to assign the volume a drive letter or pathand click Next.

8. Choose whether to format the new mirrored volume. If you choose toformat the new volume, specify the following settings:

. File system (NTFS is the only option for dynamic volumes underthe Disk Management console)

. Allocation unit size

. Volume label

. Mark the check box to Perform a Quick Format (if desired)

. Mark the check box to Enable File and Folder Compression (ifdesired)

9. Click Next to continue.

10. Click Finish to complete the New Volume Wizard.

Dynamic Volumes135

To create a mirrored volume from a boot or system volume, or to create a mir-rored volume from an existing volume that already contains data, follow thesesteps:

1. Open Disk Management.

2. Right-click an existing dynamic volume and select Add Mirror.

3. Select one of the available dynamic disks on which to create the redun-dant volume and click Add Mirror.

You should be aware of some important issues and guidelines before you attemptto mirror system or boot volumes:

. When you mirror volumes stored on ATA disks, you must change thejumper switch on the nonfailed drive to the master position (on restart) ifthe master disk on the primary IDE channel fails, until you replace thefailed disk.

. Microsoft does not recommend mirroring the system volume using oneATA disk and one SCSI disk because the system can encounter startupproblems if one of the drives fails.

. If you plan to use separate SCSI controllers for each SCSI disk that you will mirror, you should use identical controllers from the same manufacturer.

. For a mirrored system volume, be sure to run a test to simulate a diskfailure and attempt to start the system from the remaining mirrored vol-ume. Perform this test regularly as part of your backup routine before areal failure occurs.

You can stop mirroring a volume by either breaking or removing the mirror.When you break a mirrored volume, each volume that makes up the mirrorbecomes an independent simple volume, and they are no longer fault tolerant.When you remove a mirrored volume, the removed mirrored volume becomesunallocated space on its disk, whereas the remaining mirrored volume becomes asimple volume that is no longer fault tolerant. All data that was stored on theremoved mirrored volume is erased. To break a mirrored volume, take these steps:

1. Open Disk Management.

2. Right-click one of the mirrored volumes that you want to break andselect Break Mirrored Volume.

3. Click Yes in the Break Mirrored Volume message box.

136

Chapter 3: Windows Server 2008 Storage

If you want to completely destroy one of the mirrored volumes and leave justone of the volumes intact, you need to perform a removal procedure instead ofsimply breaking the mirrored volumes. Take these steps to remove a mirroredvolume:

1. Open Disk Management.

2. Right-click a mirrored volume and then select Remove Mirror.

3. At the Remove Mirror dialog box, select the disk from which you wantto completely erase the mirrored volume and turn the volume into unal-located space. The remaining volume stays with all its data intact as asimple volume.

4. Click the Remove Mirror button.

5. Click Yes to confirm the removal action at the Disk Management mes-sage box that appears.

Working with RAID-5 VolumesWindows Server 2008 supports disk striping with parity (RAID-5) volumes withthe Disk Management console and through the diskpart.exe command-lineutility. You need a minimum of three physical disks to create a RAID-5 volume.You are limited to a maximum of 32 physical disks in creating a RAID-5 volumeunder Windows Server 2008. In creating a fault-tolerant volume using a RAID-5 configuration, you effectively lose an amount of storage equivalent to thecapacity of one of the disks because parity information gets stored across all thedisks (disk striping with parity). For example, if you use three 70GB disks, yourRAID-5 volume can store up to approximately 140GB of data. The remaining70GB is used for storing the important parity data across all three disks in caseof a failure—a 33% loss of available storage capacity. However, as you add disksto a RAID-5 volume, the percentage of lost storage space diminishes. For exam-ple, if you use five 70GB disks, you would again lose 70GB of available storagecapacity, but that accounts only for a 20% overall loss in capacity (70GB divid-ed by 350GB total available disk space equals .20, or 20%). In the event that onedisk within the RAID-5 volume fails, the remaining disks can re-create the datastored on the failed disk as soon as a new disk is installed to replace the faileddisk. To create a RAID-5 volume using Disk Management, follow these steps:

1. Open Disk Management. Be sure that the computer has three or moredynamic disks—each with unallocated space.

2. Right-click an area of unallocated space on one of the dynamic disks thatyou want to use for the RAID-5 volume and select New Volume.

Dynamic Volumes137

3. Click Next for the Welcome to the New Volume Wizard window.

4. Select the RAID-5 option button and click Next.

5. Select each available disk that you want to use as part of the RAID-5 vol-ume from within the Available list box and click Add for each one. Youmust select at least 3 disks and no more than 32 disks.

6. Select any disks that you do not want to use as part of the RAID-5 vol-ume within the Selected list box, and click Remove to remove any disksthat you do not want to include as a part of the RAID-5 volume.

7. Enter the storage capacity that you want for the RAID-5 volume in theSelect the Amount of Space in MB spin box and click Next to continue.

8. Choose to assign the volume a drive letter, mount the volume in anempty NTFS folder, or choose to not assign a drive letter or path to thenew RAID-5 volume and click Next.

9. Choose whether to format the new RAID-5 volume. If you choose toformat the new volume, specify the following settings:

. File system (NTFS is the only option for dynamic volumes underthe Disk Management console).

. Allocation unit size.

. Volume label.

. Mark the check box to Perform a Quick Format (if desired).

. Mark the check box to Enable File and Folder Compression (ifdesired).

10. Click Next to continue.

11. Click Finish to complete the New Volume Wizard.

If one disk within a RAID-5 volume is intermittently failing, you can attempt toreactivate it by right-clicking the disk and selecting Reactivate Disk. If one diskwithin a RAID-5 volume appears to be permanently failed, you can replace thatfailed disk with another dynamic disk attached to the computer or you can installa new disk. To regenerate the RAID-5 volume, right-click the RAID-5 volumeon the failed disk and select Repair Volume. The replacement disk must containat least as much unallocated space as that used by the failed disk for the RAID-5 volume.

138

Chapter 3: Windows Server 2008 Storage

Mount PointsWhen you prepare a volume in Windows Server 2008, you can assign a drive let-ter to the new volume or you can create a mount point with the new volume asan empty NTFS folder. By using volume mount points, you can graft, or mount,a target partition into a folder on another drive. The mounting is handled trans-parently to the user and applications. With the NTFS volume mount points fea-ture, you can surpass the 26-drive-letter limitation.

To assign a mount-point folder path to a drive by using the Windows interface,follow these steps:

1. In Disk Manager, right-click the partition or volume where you want toassign the mount-point folder path, and then click Change Drive Letterand Paths.

2. To assign a mount-point folder path, click Add. Click Mount in the fol-lowing empty NTFS folder, type the path to an empty folder on anNTFS volume, or click Browse to locate it (see Figure 3.4).

To remove the mount-point folder path, click it and then click Remove.

FIGURE 3.4 Mounting a vol-ume to an NTFS folder.

139

Exam Prep Questions1. You have a new Windows Server 2008 computer with multiple hard drives. You want to

implement RAID1 on the server. What do you need to first?

❍ A. Enable write catching on the first disk.

❍ B. Enable write catching on the second disk.

❍ C. Convert the basic disk to dynamic disks.

❍ D. Convert the dynamic disk to basic disks.

2. You have a Windows Server 2008 computer with two hard drives. What type of RAIDcan you implement to provide fault tolerance?

❍ A. RAID 0

❍ B. RAID 1

❍ C. RAID 5

❍ D. RAID 1 and 5

3. Which of the following types of fault-tolerant (RAID) configurations (without using aRAID controller or third-party software) can you set up, using either Disk Managementor the diskpart.exe command-line tool under Windows Server 2008? (Choosethree.)

❍ A. RAID 0

❍ B. RAID 2

❍ C. RAID 5

❍ D. RAID 1

❍ E. RAID 0+1

❍ F. RAID 10

4. On which of the following hard-disk configurations can you install a fresh copy ofWindows Server 2008? (Choose two.)

❍ A. On a basic partition

❍ B. On a dynamic volume that was created from unallocated space

❍ C. On a dynamic volume that was upgraded from a basic volume

❍ D. On a basic volume that is part of a removable disk

❍ E. On a dynamic disk that already has Windows XP Professional installed on it

Exam Prep Questions

140

Chapter 3: Windows Server 2008 Storage

5. You have a Windows Server 2008 computer with three hard drives installed. AfterWindows has been installed, each disk has at least 12GB of available disk space. Whatcan you do to provide fault tolerance data system while maximizing disk space?

❍ A. Create a striped volume on the second and third disk.

❍ B. Create a striped volume on all three disks.

❍ C. Create a striped volume using the second and third disk.

❍ D. Create a striped volume with parity using all three hard drives.

6. You have a Windows Server 2008 computer. You want to provide fault tolerance for thevolume containing the operating system. Each disk is configured as a basic disk. Theoperating system is installed on the first disk. What should you do?

❍ A. Configure a new mirrored volume using disk 0 and 1.

❍ B. Convert disk 0 to a dynamic disk. Configure a new mirrored volume usingdisk 0 and 1.

❍ C. Convert disk 1 to a dynamic disk. Configure a new mirrored volume usingdisk 0 and 1.

❍ D. Convert disk 0 and disk 1 to dynamic disks. Configure the two disks as astriped set using disk 0 and 1.

❍ E. Convert disk 0 and disk 1 to dynamic disks. Configure the two disks as amirrored volume.

7. How many primary partitions without an extended partition can reside on a basic MBRdisk under Windows Server 2003?

❍ A. 3

❍ B. 4

❍ C. 1

❍ D. 128

8. Which of the following statements are true about basic disks under Windows Server2008? (Choose two.)

❍ A. Basic disks are not supported under Windows Server 2008.

❍ B. Basic disks that were configured as one disk striping with parity set underWindows NT Server 4.0 are mounted automatically after the server isupgraded to Windows Server 2003.

❍ C. Basic disks can be formatted only as FAT or FAT32.

❍ D. You cannot convert dynamic disks back to basic disks without deleting alldata and volumes on the disks first.

❍ E. IEEE 1394 disks can only be basic disks.

141

9. You have a Windows Server 2008 computer. What command do you use to convert abasic disk to a dynamic disk?

❍ A. diskpart basic to dynamic

❍ B. diskpart convert dynamic

❍ C. format c: /fs:dynamic

❍ D. convert c: /fs:dynamic

10. What command would you use to make an iSCSI volume connect every time you bootyour system?

❍ A. iscsicli AddTarget

❍ B. iscsicli AddPersistentDevices

❍ C. iscsicli RemovePersistentDevices

❍ D. iscsicli ClearPersistentDevices

11. What command would you use to remove all iSCSI volumes so that they do not con-nect when you boot your system?

❍ A. iscsicli AddTarget

❍ B. iscsicli AddPersistentDevices

❍ C. iscsicli RemovePersistentDevices

❍ D. iscsicli ClearPersistentDevices

12. What command would you use to change a master boot record disk into a GUID parti-tion table disk?

❍ A. fdisk

❍ B. format

❍ C. diskpart

❍ D. convert

13. What is the default port used by iSCSI?

❍ A. TCP port 389

❍ B. TCP port 443

❍ C. TCP port 1433

❍ D. TCP port 3260

Exam Prep Questions

142

Chapter 3: Windows Server 2008 Storage

14. You have the following address:

iqn.2534-05.com.microsoft:storage.tape.sys2.123

What type of address is this?

❍ A. MAC Address

❍ B. IP Address

❍ C. iSCSI Qualified Name

❍ D. Extended Unique Identifier

Answers to Exam Prep Questions1. Answer C is correct. RAID 1 (disk mirroring) needs two disks to be implemented.

Before you can enable RAID 1 using Windows Server 2008, you need to convert basicdisks to dynamic disks, which converts the partitions into volumes. Answers A and Bare incorrect because write catching improves disk performance but does not helpimplement RAID 1. Answer D is incorrect because to implement RAID 1 usingWindows Server 2008, you must use dynamic disks.

2. Answer B is correct. RAID 1, disk mirroring, uses two disks to provide fault tolerance.In RAID 1, whatever is written to one disk is written to the other. Answer A is incorrectbecause RAID 0, disk striping, does enhance performance, but does not provide faulttolerance. Answers C and D are incorrect because RAID 5 (disk striping with parity)needs three disks to be implemented.

3. Answers A, C, and D are correct. Windows Server 2003 supports disk striping (RAID 0),disk striping with parity (RAID 5), and disk mirroring (RAID 1). Answer B is incorrectbecause Windows Server 2008 does not natively support hammering code error-cor-recting code (ECC) disk configurations (RAID 2). Answer E is incorrect becauseWindows Server 2008 does not natively support striped volumes that are part of a mir-rored set (RAID 0+1). Answer F is incorrect because Windows Server 2008 does notnatively support mirrored volumes that are part of a striped array set (RAID 10).

4. Answers A and C are correct. You can install a fresh copy of Windows Server 2008onto a basic partition and onto a dynamic volume if the volume was originally a basicpartition that was upgraded to dynamic because Windows Server 2008 can be installedonly on a disk that contains a partition table. Answer B is incorrect because a dynamicvolume that was created from unallocated space does not contain a partition table.Answer D is incorrect because Windows Server 2008 Setup does not support installa-tion onto removable media such as USB disks or IEEE 1394 (FireWire) disks. Answer Eis incorrect because you can install only one operating system per dynamic disk.

143

5. Answer D is correct. Of these four options, only striped volume with parity is fault tol-erant. If one hard drive fails, the data will still be accessible. Answers A, B, and C areincorrect because although striped volumes do provide better performance, they do notprovide fault tolerance. If one disk fails, you loose all data.

6. Answer E is correct. To use RAID provided by Windows Server 2008, you must usedynamic disks. To provide fault tolerance, you create a mirrored set using disk 0 and 1.Answers A, B, and C are incorrect because a basic disk cannot be used for mirror orRAID 5 disks. Answer D is incorrect because the striped set is not fault tolerant.

7. Answer B is correct. You can create up to four primary partitions on a basic disk with-out an extended partition. Answer A is incorrect because you are limited to three pri-mary partitions only if there is an extended partition on the disk. Answer C is incorrectbecause you can have more than one primary partition on a basic disk. Answer D isincorrect because you are limited to a maximum of four primary partitions on a basicMBR disk; a basic GPT disk can host up to 128 partitions.

8. Answers D and E are correct. To convert dynamic disks back to basic disks, you mustremove all volumes on the disk, which means that all data must be removed as well.IEEE 1394 (or FireWire) disks cannot be converted to dynamic; therefore, they can onlybe basic disks. Answer A is incorrect because basic disks are supported under WindowsServer 2008. Answer B is incorrect because basic disk sets that were created under pre-vious versions of Microsoft server products are not mounted by the operating system;you must use the ftonline.exe tool on the setup CD-ROM. Answer C is incorrectbecause basic disks (and dynamic disks) can be formatted as FAT, FAT32, or NTFS.

9. Answer B is correct. The command to use to convert a basic disk to a dynamic disk isdiskpart convert dynamic. Answer A is incorrect because the command isdiskpart convert dynamic. Answers C and D are incorrect because the format and convert commands cannot be used to convert basic to dynamic disks.

10. Answer B is correct. The iscsicli AddPersistentDevices command makes aniSCSI device persistent so that it connects every time the system boots. Answer A is incor-rect because iscsicli AddTarget only creates a connection to a volume or device. Ifyou reboot your system, it does not automatically connect. Answers C and D are incorrectbecause the iscsicli RemovePersistentDevices command prevents the recon-nection to a specified volume, and the iscsicli ClearPersistentDevices com-mand removes all volumes and devices from the list of persistent devices.

11. Answer D is correct. The iscsicli RemovePersistentDevices command pre-vents reconnection to a specified volume. Answer A is incorrect because iscsicliAddTarget only creates a connection to a volume or device. If you reboot your sys-tem, it does not automatically connect. Answer B is incorrect because the iscsicliAddPersistentDevices command makes an iSCSI device persistent so that itconnects every time the system boots. Answer C is incorrect because the iscsicliRemovePersistentDevices command prevents the reconnection to a specifiedvolume, not all volumes.

Answers to Exam Prep Questions

144

Chapter 3: Windows Server 2008 Storage

12. Answer C is correct. The diskpart command is a powerful disk management toolthat can convert an MBR disk to a GUID partition table disk. Answer A is incorrectbecause fdisk is a partitioning tool used in older operating systems. Answer B isincorrect because the format command is used to format a disk, which would defineFAT32 or NTFS. Answer D is incorrect because the convert command could be usedto convert a FAT32 volume to a NTFS volume.

13. Answer D is correct. The default port for iSCSI is 3260. Answer A is incorrect becauseTCP port 389 is used by Lightweight Directory Access Protocol (LDAP). Answer B isincorrect because TCP port 443 is used by SSL. Answer C is incorrect because TCPport 1433 is used by SQL servers.

14. Answer C is correct. The address is an example of the iSCSI Qualified Name, which isthe most commonly used iSCSI address. Answer A is incorrect because the MACaddresses used to identify network cards are 48-bits/12 hexadecimal numbers. AnswerB is incorrect because an IPv4 address is a 32-bit address consisting of four 8-bitoctets, each octet ranging from 0-255. Answer D is incorrect because the ExtendedUnique Identifier is another addressing scheme used by iSCSI, which is provided bythe IEEE Registration authority in accordance with EUI-64 standard (EUI is short forextended unique identifier).

Need to Know More?For more information about storage technologies, including NTFS and FAT filesystems and Basic and Dynamic Disks, visit the following website:

http://technet2.microsoft.com/windowsserver/en/library/57282c22-30e9-4d52-9c6d-2d2db8c56adc1033.mspx?mfr=true

For more information about the diskpart.exe command, visit the followingwebsites:

http://support.microsoft.com/kb/300415

http://technet2.microsoft.com/WindowsServer/en/Library/ca099518-dde5-4eac-a1f1-38eff6e3e5091033.mspx?mfr=true

For more information about iSCSI, including links to the iSCSI SoftwareInitiator, visit the following website:

http://www.microsoft.com/windowsserver2003/technologies/storage/iscsi/default.mspx

Aaccess

mappings, 227-228RemoteApp, 320-322restricting, 263TS Web Access, 322-324

accounts, WSS, 220-221

activating Windows, 84-85configuring KMS, 96-97KMS, 85-91local reactivation, 97-98VAMT, 91

adding MAK, 99computers, 92-94enabling MAK, 94installing, 91-92MAK Proxy Activation, 95-96managing, 99

Active Directory Certification AuthorityTools, 51

Active Directory Domain Services (AD DS)Tools, 51

Active Directory Lightweight DirectoryServices (AD LDS) Tools, 51

active nodes, modifying, 282

Active Scripting engines, 147

Active Server Pages (ASPs), 147

AD (Active Directory) client certificateauthentication, 175

AD DS (Active Directory Domain Services)Tools, 51

AD LDS (Active Directory LightweightDirectory Services) Tools, 51

adapters, adding, 363

Add Failed Request Tracing Rule dialogbox, 193

Add Features Wizard, 290

Add Publishing Point Wizard, 259

Add Server dialog box, 118

Add Target Portal dialog box, 115

444

adding

addingcomputers to VAMT, 92-94Fibre Channel, 118filters, ISAPI, 160groups, Remote Desktop, 303MAK, 99modules, 160-161network adapters, 363ports, 118virtual directories, 152-153

Administrative Tools, 46-47running, 56-57

Advanced Fast Start, 256

advertisements, publishing points, 262

AIK (Automated Installation Kit), 70

alerts, configuring, 239

allocation policies, creating, 334-335

Allow User dialog box, 181

American National Standards Institute(ANSI), 111

announcement files, 262

anonymous authentication, 174

ANSI (American National StandardsInstitute), 111

antivirus, WSS, 220

appcmd.exe commands, 161-169, 188

appletsControl Panel, 54iSCSI Initiators, 114

Application Management page(SharePoint Central Administration),221-229

applicationslicensing, 309

migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

pools, 153-155RemoteApp, 320-322web, creating, 222-227

applyingapplication pools, 153-155Configuration Stores, 148-150Connections panes, 150

architecture, Hyper-V, 350-351

ASP.NET, 147Code Access Security, 182-183impersonation, 174web applications, 170-172

ASPs (Active Server Pages), 147

assigning mount points, 138

audio, 251. See also media

authenticationclient certificate mapping, 179IIS, 174-175

authorizationTS Gateway, 325-327URL rules, 172-173

Automated Installation Kit (AIK), 70

automatingconfiguring KMS, 96-97local reactivation, 97-98updates, 58VAMT, 91

adding MAK, 99computers, 92-94enabling MAK, 94installing, 91-92MAK Proxy Activation, 95-96managing, 99

Bbackup

IIS, 188WSS, 219-220

banner advertisements, 262

basic authentication, 174

basic disks, 120, 122-126

Basic Input/Output System (BIOS), 120

binding, 152

configuring445

BIOS (Basic Input/Output System), 120

BitLocker Drive Encryption Tools, 52

booting images, 72

broadcast publishing pointsconfiguring, 260creating, 257, 260

CCA (Certificate Authority), 176

CAPs (Connection Authorization Policies),325-327

capturing images, 72, 79-81

cards, networks, 360-363

Certificate Authority (CA), 176

certificatesclient mapping authentication, 179digital, 175-180

CGI (Common Gateway Interface), 162

change logon command, 318

clientscertificate mapping

authentication, 179KMS, activating, 89-91operating systems, Hyper-V, 349-350prestaging, 83-84

cloning disks, 66-67

clustersfailover, 273-275

creating, 278-282customizing, 284-285modifying active nodes, 282network roles/types, 283ownership, 286-287quorum configuration, 285-286system installing, 276system requirements, 275testing, 276-278troubleshooting, 287-288verifying IP address resources,

283-284

NLB, 271, 288configuring, 290-294customizing, 289-290installing, 290-294starting/stopping, 294-295Terminal Services, 329-332

Code Access Security (ASP.NET), 182-183

command-line toolsiSCSICLI, 116Terminal Services, 318-319WMIC, 191

commandsappcmd.exe, 161-169, 188change logon, 318cscript, 58inetmgr, 148logoff, 318mstsc, 306nlbmgr, 290psconfig.exe, 231Stsadm, 232-233vmconnect.exe, 354wdsutil, 78xcopy, 170, 172

Common Gateway Interface (CGI), 162

compressiondata transfer protocols, 253IIS Manager, configuring, 157-158

Computer Management console, 46-47

computers, naming, 55

Configuration Stores, 148-150

configuringalerts, 239Application Management page

(SharePoint CentralAdministration), 221-229

automatic updates, 58broadcast publishing points, 257-260captured images, 79-81clustering, 275Connections pane, 150

446

configuring

managed modules, 161recycling worker processes,

155-156security, 172-183Shared Configuration feature, 188SMTP, 183-188starting/stopping web servers,

150-151troubleshooting, 191-197USAPI filters, 160WMIC, 191xcopy commands, 170-172

failover clustering, 278-282customizing, 284-285network roles/types, 283ownership, 286-287quorum configuration, 285-286troubleshooting, 287-288verifying IP address resources,

283-284Fibre Channel, 118handler permissions, 162Hyper-V

architecture, 350-351creating virtual machines,

355-357file structures, 351-352high availability, 364installing, 352-353managing, 353-354managing virtual machines,

357-364Server Core, 365

IISadding virtual directories,

152-153appcmd.exe commands, 163-169application pools, 153-155backup, 188compression, 157-158Configuration Store, 148-150Connections pane, 150creating websites, 151

default documents, 158-159FTP, 189-191handlers, 162-163IIS Manager 7.0, 147-148, 156

IIS Configuration Store, 148Initial Configuration Tasks

window, 50iSCSI Initiators, 114-117KMS, 96-97network connections, 56NLB, 290, 292-294Operations tab (SharePoint Central

Administration), 215-217antivirus settings, 220backup settings, 219-220incoming email settings, 218-219outgoing email settings, 217service account settings, 220-221

quota limits, 229Remote Desktop, 303

group policies, 307-308mstsc command, 306RDC, 304-306RDP, 307Server Core, 303snap-ins, 308-309

self-service sites, 228servers

RSAT, 51-52Server Core, 52-57

streaming media, 250data transfer protocols, 252-254MBR (multiple bit rate), 251TCP versus UDP, 251unicast versus multicast, 252

Terminal Services, 313-317command-line tools, 318-319NLB, 329-332printing, 333-334profiles, 332RemoteApp, 320-322Single Sign-On, 320

converting basic disks447

TS Gateway, 324-329Web Access, 322-324WSRM, 334-336

Validate a Configuration Wizard, 277volumes

extending, 131-132mirrored, 133-137mount points, 138RAID-5, 133-137simple, 130spanned, 130-131striped, 132-133

WDS servers, 74-79web pages, 146-147websites, 151Windows, 44

Administrative Tools, 46-47Control Panel, 44Server Manager console, 47Windows Reliability and

Performance Monitor, 48-49WMS

announcement files, 262DRM, 265-266installing, 254-255live content streaming, 260on-demand streaming, 255-260publishing point

advertisements, 262publishing point properties, 261security, 263SMIL-based playlists, 262troubleshooting, 264-265

WSS, 211-212installing, 213managing, 233-239planning, 212psconfig.exe command, 231SharePoint 3.0 Central

Administration, 215-230SharePoint Products and

Technologies ConfigurationWizard, 214

Stsadm command, 232-233troubleshooting, 241upgrading, 213workflows, 239-240

connectingFibre Channels, 118IDs, viewing, 328licensing, 309

migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

networks, configuring, 56publishing points, 257Remote Desktop, 303

group policies, 307-308mstsc command, 306RDC, 304-306RDP, 307Server Core, 303snap-ins, 308-309

troubleshooting, 265virtual machines, 354WDS servers, 72-73

Connection Authorization Policies (CAPs),325-327

Connections pane, 150

consolesComputer Management, 46-47IIS Manager 7.0, 147-148

Configuration Store, 148-150Connections pane, 150

Server Manager, 47content

expiration, 263streaming, implementing, 255-257

Control Panel, 44applets, 54

convergence, 290

converting basic disksto dynamic disks, 122-125to GPT disks, 125-126

448

cscript command

cscript command, 58

customizingfailover clustering, 284-285NLB, 289-290Server Core, 57-58

DData and Time applet, 55

Data Collector Set (DCS), 48

Data Execution Prevention (DEP), 352

Data Sources (ODBC), 46

data transfer protocols, 252-254

DCS (Data Collector Set), 48

default documents, configuring, 158-159

defining permissions, 162

delegate permissions, 180-182

deleting virtual networks, 362

DEP (Data Execution Prevention), 352

deployingASP.NET web applications, 170-172KMS clients, 90-91WDS, 71

configuring, 74-79connecting, 72-73discover images, 82image types, 71-72installing, 73-74multicast support, 81-82prestaging, 83-84

Windowswith WIM files, 67-69with Windows SIM, 70

Deployment Servers, 74

DHCP (Dynamic Host ConfigurationProtocol), 44, 51

dialog boxesAdd Failed Request Tracing Rule, 193Add Server, 118Add Target Portal, 115Allow User, 181

Edit Feature Permissions, 162Log On to Target, 116Manage Server Connections, 118Storage Explorer, 117System Properties, 303User Account Control, 278

differencing disks, virtual machines, 359

digest authentication, 174

digital certificates, 175-180

Digital Rights Management. See DRM

directories, adding virtual, 152-153

disablingKMS, 87-88logging, 191

discover images, 72WDS servers, 82

discovery, licensing, 312

diskscloning, 66-67differencing virtual machines, 359dynamically expanding hard, 358fixed-size virtual hard, 357partitioning, 119-120, 128-129storage management, 120

basic disks, 120-126dynamic disks, 121-126moving, 127-128

DNS (Domain Name Service), publishingKMS to, 87-89

DNS Server Tools, 51

Document Library, 211, 237-239

domainsjoining, 55KMS, 89

DRM (Digital Rights Management), 263-266

dynamic discovery, 82

dynamic disks, 120-126

Dynamic Host Configuration Protocol(DHCP), 44, 51

files449

dynamic volumes, 129extending, 131-132mirrored volumes, 133-137RAID-5 volumes, 133-137simple volumes, 130spanned volumes, 130-131striped volumes, 132-133

dynamically expanding hard disks, 358

EEBs (exabytes), 120

ECC (Error Correcting Code) memory, 272

Edit Feature Permissions dialog box, 162

EFI (Extensible Firmware Interface), 120

emailincoming settings, configuring,

218-219outgoing settings, configuring, 217

enablingautomatic updates, 58compression, 157data transfer protocols, 253handlers, 163KMS, 87-88logging, 191MAK, 94Single Sign-On, 320SMTP, 183-184Usage Analysis Processing, 241

encryption, 175-180

end-of-file acknowledgements, 253

enlightened operating systems, 349

error checking data transfer protocols, 252

Error Correcting Code (ECC) memory, 272

Event Viewer, 46

exabytes (EBs), 120

eXecuted Disable (XD), 352

exportingcriteria, 336digital certificates, 178

extending volumes, 131-132

Extensible Firmware Interface (EFI), 120

FFailed Request tracing, 192-195

failover clustering, 273-275active nodes, modifying, 282creating, 278-282customizing, 284-285installing, 276IP addresses, 283-284network roles/types, 283ownership, 286-287quorum configuration, 285-286system requirements, 275testing, 276-278troubleshooting, 287-288

Failover Clustering Tools, 52

Fast Cache, 256

Fast Recovery, 256

Fast Start, 256

fast-forward/rewind, 257

FC-SW (Fibre Channel switched fabric), 111

FCP (Fibre Channel Protocol), 111

FEC (forward error correction), 256

Fibre Channel, 110-112

Fibre Channel Protocol (FCP), 111

Fibre Channel switched fabric (FC-SW), 111

File Services Tools, 51

File Transfer Protocol. See FTP

filesannouncements, 262Configuration Store, 148-150Hyper-V, 351-352RDP, 307streaming media, 250-251WIM, deploying Windows with,

67-69

450

filters, adding ISAPI

filters, adding ISAPI, 160

fixed-size virtual hard disks, 357

folders, NTFS, 138

Form library, 238

formatting. See also configuringself-service sites, 228web pages, 146-147websites, 151

forms authentication, 174

forward error correction (FEC), 256

FTP (File Transfer Protocol), 146, 189-191

Ggateways, 324

authorization, 325-327Group Policy settings, 329installing, 325monitoring, 328

GPT (GUID partition table), 119disks, converting to basic disks,

125-126gradual WSS upgrades, 213

Group PolicyManagement Tools, 52TS Gateway, 329

groupscluster resource, 274policies, applying with RDC, 307-308Remote Desktop, 303WSS, 234-235

GUID partition table. See GPT

Hhandlers, 162-163

hardwarehot-add/hot-replace memory/

processors, 273redundancy, 272-273WSS server requirements, 211

HBA (Host Bus Adapter), 113

heartbeats, 274

high availability, 272failover clustering, 273-275

creating, 278-282customizing, 284-285installing, 276modifying active nodes, 282network roles/types, 283ownership, 286-287quorum configuration, 285-286system requirements, 275testing, 276-278troubleshooting, 287-288verifying IP address resources,

283-284hardware redundancy, 272-273virtual machines, 364

Host Bus Adapter (HBA), 113

hosts, NLB, 291

hot-add/hot-replace memory/processors, 273

HTML (Hypertext Markup Language), 146.See also web pages

HTTP (Hypertext Transfer Protocol), 146,252-254

Hyper-V, 348architecture, 350-351client operating, 349-350creating virtual machines, 355-357features, 348-349file structures, 351-352high availability, 364installing, 352-353managing, 353-354Server Core, 365virtual machines, 357-364

Hypertext Markup Language. See HTML

Hypertext Transfer Protocol. See HTTP

installing451

Iidentifying of VLANs, 364

IIS (Internet Information Services), 44, 146

appcmd.exe commands, 163-169backup, 188FTP, 189-191handlers, 162-163IIS Manager 7.0

adding virtual directories, 152-153

application pools, 153-155compression, 157-158Configuration Store, 148-150configuring, 147-148, 156Connections pane, 150creating websites, 151default documents, 158-159recycling worker processes,

155-156starting/stopping web servers,

150-151ISAPI filters, 160managed modules, 161security, 172

ASP.NET Code Access Security,182-183

authentication, 174-175delegate permissions, 180-182Machine Key, 180SSL, 175-180URL authorization rules, 172-173

Shared Configuration feature, 188SMTP, 183-188troubleshooting, 191

logging, 191tracing, 192-195viewing worker processes,

195-197WMIC, 191xcopy commands, 170-172

imagescapturing, 79-81types, 71-72

impersonation, ASP.NET, 174

implementingcontent streaming, 255-257on-demand publishing, 257, 260

importingcriteria, 336digital certificates, 178-179

in-place WWS upgrades, 213

INCITS (InterNational Committee forInformation Technology Standards), 111

incoming email settings, 218-219

inetmgr command, 148

infrastructure, failover clustering requirements, 276

Initial Configuration Tasks window, 50

initiators,113-117

installingAIK, 70digital certificates, 177dynamic volumes, 129

extending, 131-132mirrored volumes, 133-137RAID-5 volumes, 133-137simple volumes, 130spanned volumes, 130-131striped volumes, 132-133

failover clustering, 276Hyper-V, 352-353images, 71NLB, 290-294roles, 38TS Gateway, 325VAMT, 91-92WDS servers, 73-74Windows

Features, 41with Windows SIM, 69-71

WMS, 254-255WSS, 211-213

452

interfaces

interfacesCGI, 162EFI, 120mount points, assigning, 138WMIC, 191

InterNational Committee for InformationTechnology Standards (INCITS), 111

Internet Information Services. See IIS

Internet SCSI (iSCSI), 47, 112-117

Internet Server Application ProgrammingInterface filters. See ISAPI filters

Internet Storage Name Service (iSNS), 113

interstitial advertisements, 262

inventories, testing, 277

IP addresses, verifying, 283-284

ISAPI (Internet Server ApplicationProgramming Interface) filters, adding, 160

iSCSI (Internet SCSI), 47, 112-117

iSNS (Internet Storage Name Service), 113

J–Kjoining domains, 55

Jscript, 147

Key Management Service (KMS), 84-91

LLDR (Logical Disk Manager), 121

libraries, Document Library, 211, 237-239

licensing, 309migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

limits, configuring quota, 229

live content streaming, 260

local reactivation, 97-98

Local Security Policy, 47

log file rollover options, configuring, 192

Log On to Target dialog box, 116

logging IIS, troubleshooting, 191

Logical Disk Manager (LDR), 121

logical unit numbers (LUNs), 117

logoff command, 318

LUNs (logical unit numbers), 117

MMachine Key, 180

MAK (Multiple Activation Key), 84adding, 99enabling, 94MAK Proxy Activation, 95-96

Manage Server Connections dialog box, 118

managed modules, adding, 161

managingdisk storage, 120

basic disks, 120-126dynamic disks, 121-126moving, 127-128

DRM, 265-266Hyper-V, 353-354

creating virtual machines, 355-364

high availability, 364Server Core, 365

IISappcmd.exe commands, 163-169backup, 188FTP, 189-191handlers, 162-163ISAPI filters, 160managed modules, 161security, 172-183Shared Configuration feature, 188SMTP, 183-188troubleshooting, 191-197WMIC, 191xcopy commands, 170-172

Microsoft Remote Server Administration Tools (RSAT)453

IIS Manager 7.0, 147-148adding virtual directories,

152-153application pools, 153-155compression, 157-158Configuration Store, 148-150configuring, 156Connections pane, 150creating websites, 151default documents, 158-159recycling worker processes,

155-156starting/stopping web servers,

150-151licensing, 309

migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

Network Load Balancing Manager, 295

SANs, 117-119servers

roles, 38-40RSAT, 51-52Server Core, 52-58Windows Features, 41-44

services, 47state, 335-336Terminal Services, 313-317

command-line tools, 318-319NLB, 329-332printing, 333-334profiles, 332RemoteApp, 320, 322Single Sign-On, 320TS Gateway, 324-329Web Access, 322-324WSRM, 334-336

VAMT, 91, 99adding computers to, 92-94adding MAK, 99configuring KMS, 96-97

enabling MAK, 94installing, 91-92local reactivation, 97-98MAK Proxy Activation, 95-96

virtual networks, 360-363Windows, 44

Administrative Tools, 46-47Control Panel, 44Server Manager console, 47Windows Reliability and

Performance Monitor, 48-49WSS, 233-239

troubleshooting, 241workflows, 239-240

mappingaccessing, 227-228client certificate authentication, 179

MBR (Master Boot Record), 119

MBR (multiple bit rate) streaming, 251

mediaplayers, content streaming features,

256-257streaming, 250

MBR (multiple bit rate), 251TCP versus UDP, 251transfer protocols, 252-254unicast versus multicast, 252

memoryECC, 272hot-add/hot-replace, 273

Memory Diagnostics Tool, 47

Microsoft Management Console (MMC), 46

Microsoft .NET Framework, 147

Microsoft Remote Server AdministrationTools (RSAT), 51

Windows Server 2008Administration Tools for Features, 52

Windows Server 2008Administration Tools for Roles, 51-52

454

Microsoft System Center Operations Manager (SCOM)

Microsoft System Center OperationsManager (SCOM), 354

migratinglicensing, 312Quick Migration, 364

mirrored volumes, 133-137

missing disks, reactivating, 127-128

MMC (Microsoft Management Console), 46

modifyingactive nodes, 282computers, naming, 55virtual networks, 362

modules, adding, 160

monitoringTS Gateway, 328virtual machines, 354Windows Reliability and

Performance Monitor, 48-49mount points, 138

moving disks, 127-128

mstsc command, 306

multi-pathing (MPIO), 116

multicastingMAC addresses, 289streaming, 252support, WDS servers, 81-82

Multiple Activation Key (MAK), 84adding, 99enabling, 94MAK Proxy Activation, 95-96

multiple bit rate (MBR) streaming, 251

multiple domain support, KMS, 89

Nnaming computers, 55

NAS (network-attached storage), 110

.NET Framework, 147

network load balancing. See NLB

Network Load Balancing Manager, 295

Network Load Balancing Tools, 52

Network Policy and Access ServicesTools, 52

Network Policy Server (NPS), 325-327

network-attached storage. See NAS

networksadapters, adding, 363cards, 360-363connections, configuring, 56failover clustering requirements, 275SANs, 110

Fibre Channel, 110-112iSCSI, 112-117Storage Explorer, 117Storage Manager, 117-119

testing, 277troubleshooting, 265virtual, managing, 360-363

New Server Cluster Wizard, 283

NLB (network load balancing), 271, 288configuring, 290-294customizing, 289-290installing, 290-294starting/stopping, 294-295Terminal Services, 329-330TS Session Broker, 330-332

nlbmgr command, 290

No eXecute (NS), 352

nodes, modifying active, 282

NPS (Network Policy Server), 325-327

NS (No eXecute), 352

NTFS folders, mounting volumes to, 138

OOCI (Oracle Call Interface), 44

ODBC (Open Database Connectivity), 44

offline disks, reactivating, 127-128

on-demand streaming, 255-257, 260

Open Database Connectivity (ODBC), 44

publishing455

openingData and Time applets, 55IIS Manager 7.0, 148Server Manager, 48

operating system clients, Hyper-V, 349-350

Operations tab (SharePoint CentralAdministration), 215-217

antivirus settings, 220backup settings, 219-220incoming email settings, 218-219outgoing email settings, 217service account settings, 220-221

optionsNLB, 289-290publishing point properties, 261Server Core, 57-58

Oracle Call Interface (OCI), 44

outgoing email settings, 217

ownership, failover clustering, 286-287

PP2V (physical-to-virtual) conversion, 354

partitioning disks, 119-120, 128-129

paths, WSS, 212

PerlScript, 147

permissionsdefining, 162delegates, 180-182handlers, configuring, 162WSS, 234-235

physical-to-virtual (P2V) conversion, 354

Picture Library, 238

planning WSS, 212

players, media, 256-257

Playlist Editor, 262

playlists, 262

policiesallocation, creating, 334-335Group Policy, TS Gateways, 329

groups, applying with RDC, 307-308resource authorization, 325, 327

pools, applications, 153-155

Portable Operating System Interface(POSIX), 43

portsadding, 118NLB, 291unicast streaming, 254

POSIX (Portable Operating SystemInterface), 43

pre-boot execution environment (PXE), 76

prestaging clients, WDS servers, 83-84

Print Management, 47

printing Terminal Services, 333-334

processesrecycling, 155-156viewing, 195-197

processors, hot-add/hot-replace, 273

Product Activation, 84-85KMS, 85-91

profilesstate, managing, 335-336Terminal Services, 332

propertiesiSCSI Initiators, 115publishing point, 261

protocolsFCP, 111FTP, 146, 189-191HTTP, 146iSCSI, 112-117RDP, 307SMTP, 183-188state transfer, 252-254

psconfig.exe command, 231

publishingKMS to DNS, 87-89on-demand, implementing, 257, 260

456

publishing points

publishing points, 250, 257advertisements, 262broadcast

configuring, 260creating, 257, 260

properties, 261PXE (pre-boot execution environment), 76

Q–RQuick Migration, 364

quorum configuration, 285-286

quota limits, configuring, 229

RAID-5 volumes, 133-137

ranges, NLB ports, 291

RDC (Remote Desktop Connection), 304-306

RDP (Remote Desktop Protocol), 307

reactivating missing or offline disks, 127-128

Real-Time Streaming Protocol. See RTSP

Recycle Bins, WSS, 236-237

recycling worker processes, 155-156

redundancyhardware, 272-273hot-add/hot-replace memory/

processors, 273Reliability and Performance Monitor, 47

Remote Desktopconfiguring, 303group policies, 307-308mstsc command, 306RDC, 304, 306RDP, 307Server Core, configuring, 303snap-ins, 308-309

Remote Desktop Connection. See RDC

Remote Desktop Protocol (RDP), 307

remote servers, 51Windows Server 2008

Administration Tools for Features, 52

Windows Server 2008Administration Tools for Roles, 51-52

RemoteApp, 320-322

renamingcomputers, 55virtual machines, 351

requirementssystem, failover clustering, 275WMS, 255

resourcesauthorization policies, 325-327clusters, 274, 284-285IP addresses, verifying, 283-284WSRM, 334-335

restarting Server Core, 54

restrictingaccess, 263sessions, 314

rights, DRM, 265-266

rolescluster networks, 283servers, 38-40TS Session Broker, 330-332Windows Server 2008

Administration Tools for Roles, 51-52

root paths, WSS, 212

RSAT (Microsoft Remote ServerAdministration Tools), 51

Windows Server 2008Administration Tools for Features, 52

Windows Server 2008Administration Tools for Roles, 51-52

RTSP (Real-Time Streaming Protocol),252-254

servers457

rulesFailed Request Tracing, 192-195URL authorization, 172-173

runningAdministrative Tools, 56-57state, 335-336

SSANs (storage area networks), 110

Fibre Channel, 110-112iSCSI, 112-117Storage Explorer, 117Storage Manager, 117-119

Save States, 360

SCOM (Microsoft System CenterOperations Manager), 354

SCSI. See iSCSI

SCVMM (System Center Virtual MachineManager 2007), 354

SCW (Security Configuration Wizard), 47

SDK (software development kit), 44

Secure Sockets Layer (SSL), 175-180

securityIIS, 172

ASP.NET Code Access Security,182-183

authentication, 174-175delegate permissions, 180-182Machine Key, 180SSL, 175-180URL authorization rules, 172-173

WMS, 263Security Configuration Wizard (SCW), 47

security identifiers (SIDs), 66

self-service sites, creating, 228

Server Core, 52-58Remote Desktop for, 303virtual machines, managing, 365

Server Manager console, 47

Server Virtualization Management Pack, 354

serversfailover clustering requirements, 275Fibre Channel, adding, 118Hyper-V, 348

architecture, 350-351client operating systems, 349-350creating virtual machines, 355-357features, 348-349file structures, 351-352high availability, 364installing, 352-353managing, 353-354Server Core, 365virtual machines, 357-364

IIS Managercompression, 157-158configuring with, 156default documents, 158-159

Initial Configuration Tasks window, 50

New Server Cluster Wizard, 283roles, 38-40Server Core, 52-58virtual

creating virtual machines, 355-357

high availability, 364managing, 353-354Server Core, 365virtual machines, 357-364

web, starting/stopping, 150-151Windows Features, 41-44WSS

configuring, 211-212installing, 213planning, 212psconfig.exe command, 231SharePoint 3.0 Central

Administration, 215-230

458

servers

SharePoint Products andTechnologies ConfigurationWizard, 214

Stsadm command, 232-233upgrading, 213

servicesaccounts, WSS, 220-221IIS, 146KMS, 85-91managing, 47Terminal Services, 302. See also

Terminal ServicesWDS, 71

configuring, 74-77, 79connecting, 72-73discover images, 82image types, 71-72installing, 74multicast support, 81-82prestaging, 83-84

WMS. See WMSsessions

restricting, 314Terminal Services

printing, 333-334profiles, 332WSRM, 334-336

TS Session Broker, 330-332Shared Configuration feature (IIS), 188

SharePoint 3.0 Central Administration,215-230

SharePoint Products and TechnologiesConfiguration Wizard, 214

shutting down Server Core, 54

SIDs (security identifiers), 66

Simple Mail Transfer Protocol. See SMTP

Simple Network Management Protocol(SNMP), 44

simple volumes, 130-132

Single Sign-On, 320

sites path, WSS, 212

SMIL-based playlists, 262

SMTP (Simple Mail Transfer Protocol),52, 183-188

snap-ins, Remote Desktop, 308-309

snapshots, virtual machines, 358-359

SNMP (Simple Network ManagementProtocol), 44

software development kit (SDK), 44

software requirements, WSS servers, 212

sound, 251. See also media

spanned volumes, 130-132

SSL (Secure Sockets Layer), 175-180

startingapplication pools, 155IIS Manager 7.0, 148NLB, 294-295web servers, 150-151

state, running, 335-336

static discovery, 82

status codes, 193

stoppingapplication pools, 155NLB, 294-295web servers, 150-151

storagedisk management, 120

basic disks, 120-126dynamic disks, 121-126moving, 127-128

failover clustering requirements, 275testing, 277

storage area networks. See SANs

Storage Explorer, 117

Storage Manager, 117-119

Storage Manager for SANs Tools, 52

Stream Test Utility button, 264

streaming, 250announcement files, 262data transfer protocols, 252-254live content, 260

tools459

MBR (multiple bit rate), 251on-demand, 255-257, 260publishing points

advertisements, 262properties, 261

SMIL-based playlists, 262TCP versus UDP, 251testing, 264unicast versus multicast, 252

striped volumes, 132-133

Stsadm command, 232-233

SUA (subsystem for UNIX-basedApplications), 43

System Center Virtual Machine Manager2007 (SCVMM), 354

System Center Virtual Machine Manager2007 (VMM), 354

System Configuration, 47

System Preparation tool (Sysprep), 66-67

System Properties dialog box, 303

system requirementsfailover clustering, 275WMS, 255

TT11 Technical Committee, 110

tagging VLANs, 364

targets, iSCSI, 114

Task Scheduler, 47

TCP (Transmission Control Protocol),streaming media, 251

Terminal Services, 302command-line tools, 318-319configuring, 313-317licensing, 309

migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

NLB, 329-332printing, 333-334profiles, 332Remote Desktop, 303

group policies, 307-308mstsc command, 306RDC, 304, 306RDP, 307Server Core, 303snap-ins, 308-309

RemoteApp, 320-322Single Sign-On, 320TS Gateway, 324

authorization, 325-327Group Policy settings, 329installing, 325monitoring, 328

Web Access, 322-324WSRM, 334

creating resource allocation policies, 334-335

importing/exporting criteria, 336running state, 335-336

Terminal Services client access licenses(TS CALs), 309

Terminal Services Tools, 52

testingfailover clustering, 276-278Stream Test Utility, 264Validate a Configuration

Wizard, 277toolbars, Connections pane, 150

toolsAdministrative Tools, 46-47, 56-57Control Panel, 44Initial Configuration Tasks

window, 50iSCSICLI, 116psconfig.exe command, 231

460

tools

RSAT, 51Windows Server 2008

Administration Tools forFeatures, 52

Windows Server 2008Administration Tools for Roles,51-52

Server Core, 57-58Server Manager console, 47SharePoint 3.0 Central

Administration, 215-230Stream Test Utility, 264Stsadm command, 232-233System Preparation Tool (Sysprep),

66-67Terminal Services, 318-319VAMT, 91

adding MAK, 99computers, 92-94configuring KMS, 96-97enabling MAK, 94installing, 91-92local reactivation, 97-98MAK Proxy Activation, 95-96managing, 99

Windows Reliability andPerformance Monitor, 48-49

WMIC, 191tracing IIS, troubleshooting, 192-195

tracking licensing, 312

Transmission Control Protocol. See TCP

Transport Servers, 74

troubleshootingclustering, 287-288IIS, 191

logging, 191tracing, 192-195viewing worker processes,

195-197licensing, 313WMS, 264-265WSS, 241

TS CALs (Terminal Services client accesslicenses), 309

typesof clusters, 283of disk partitioning styles, 119of dynamic volumes, 129of images, 71-72

UUDDI (Universal Description, Discovery,

and Integration) Services Tools, 52

UDP (User Datagram Protocol), streamingmedia, 251

unenlightened operating systems, 350

unicast MAC addresses, 289

unicast streamingports for, 254streaming media, 252

uniform resource locators. See URLs

Universal Description, Discovery, andIntegration (UDDI) Services Tools, 52

updating, configuring automatic updates, 58

upgrading WSS, 213

URLs (uniform resource locators), 146authorization rules, 172-173

Usage Analysis Processing, 241

User Account Control dialog box, 278

User Datagram Protocol. See UDP

usersallowing, 181licensing, 309

migrating, 312tracking, 312troubleshooting, 313TS licensing, 309-311

Remote Desktop, 303WSS, 234-235

Web Access (Terminal Services)461

VValidate a Configuration Wizard, 277

VAMT (Volume Activation ManagementTool), 91

adding computers to, 92-94adding MAK, 99configuring KMS, 96-97enabling MAK, 94installing, 91-92local reactivation, 97-98MAK Proxy Activation, 95-96managing, 99

VBScript, 147

VDS (Virtual Disk Service), 117

verifying IP addresses, 283-284

video, 251. See also media

viewingIIS, troubleshooting, 195-197TS Gateways, 328

virtual directories, adding, 152-153

Virtual Disk Service (VDS), 117

virtual LANs (VLANs), 364

virtual machines, Hyper-V, 348architecture, 350-351client operating systems, 349-350creating, 355-357features, 348-349file structures, 351-352high availability, 364installing, 352-353managing, 353-364Server Core, 365

virtual networks, managing, 360-363

virtual servers, cluster, 274

VLANs (virtual LANs), 364

vmconnect.exe command, 354

VMM (System Center Virtual MachineManager 2007), 354

Volume Activation Management Tool(VAMT), 91

adding MAK, 99computers, 92-94configuring KMS, 96-97enabling MAK, 94installing, 91-92local reactivation, 97-98MAK Proxy Activation, 95-96managing, 99

Volume Shadow Copy Service (VSS), 354

volumesdynamic, 129

extending, 131-132mirrored volumes, 133-137RAID-5 volumes, 133-137simple volumes, 130spanned volumes, 130-131striped volumes, 132-133

mount points, 138VSS (Volume Shadow Copy Service), 354

WW3C (World Wide Web Consortium), 262

W3SVC (World Wide Web PublishingService), 150

WAS (Windows Process ActivationService), 150

WDS (Windows Deployment Services), 71configuring, 74-79connecting, 72-73discover images, 82image types, 71-72installing, 73-74multicast support, 81-82prestaging, 83-84

wdsutil command, 78

Web Access (Terminal Services), 322-324

462

web applications

web applicationscreating, 222-227deploying, 170-172frameworks, 147

web pages, overview of, 146-147

web servers, starting/stopping, 150-151

websitescreating, 151IIS Manager

compression, 157-158configuring with, 156default documents, 158-159

Wiki page library, 238

WIM (Windows Imaging Format) files,deploying Windows with, 67-69

Windowsactivation, 84-91Administrative Tools, 46-47authentication, 174configuring, 44Control Panel, 44Initial Configuration Tasks

window, 50installing, 69-71Server Manager console, 47WIM files, deploying with, 67-69Windows Reliability and

Performance Monitor, 48-49Windows Deployment Services (WDS), 71

configuring, 74-79connecting, 72-73discover images, 82image types, 71-72installing, 73-74multicast support, 81-82prestaging, 83-84

Windows Features, 41-44

Windows Firewall with AdvancedSecurity, 47

Windows Internet Name Service (WINS), 44

Windows Management Instrumentation.See WMIC

Windows Media Rights Manager, 263

Windows Media Services. See WMS

Windows Process Activation Service(WAS), 150

Windows Reliability and PerformanceMonitor, 48-49

Windows Server 2008roles, 38-40Server Core, 52-58Windows Features, 41-44

Windows Server 2008 AdministrationTools for Features, 52

Windows Server 2008 AdministrationTools for Roles, 51-52

Windows Server 2008 Datacenter, 273

Windows Server 2008 Enterprise, 273

Windows Server Backup, 47

Windows SharePoint Services. See WSS

Windows SIM (Windows System ImageManager), 69-71

Windows System Resource ManagerTools, 52

Windows System Resource Manager. SeeWSRM

WINS (Windows Internet Name Service), 44

wizardsAdd Features Wizard, 290Add Publishing Point Wizard, 259New Server Cluster Wizard, 283Security Configuration Wizard, 47SharePoint Products and

Technologies ConfigurationWizard, 214

Validate a Configuration Wizard, 277

zones, accessing463

WMIC (Windows ManagementInstrumentation command-line) tool, 191

WMS (Windows Media Services), 250announcement files, 262DRM, 265-266installing, 254-255live content streaming, 260on-demand streaming, 255-257, 260publishing points

advertisements, 261properties, 262

security, 263SMIL-based playlists, 262streaming media, 250

data transfer protocols, 252-254MBR (multiple bit rate), 251TCP versus UDP, 251unicast versus multicast, 252

troubleshooting, 264-265worker processes

recycling, 155-156viewing, 195-197

workflows, 239-240

World Wide Name (WWN), 118

World Wide Web Consortium (W3C), 262

World Wide Web Publishing Service(W3SVC), 150

wrapper advertisements, 262

WSRM (Windows System ResourceManager), 334

creating resource allocation policies,334-335

importing/exporting criteria, 336running state, 335-336

WSS (Windows SharePoint Services), 210installing, 211-213managing, 233-239psconfig.exe command, 231SharePoint 3.0 Central

Administration, 215-230SharePoint Products and

Technologies ConfigurationWizard, 214

Stsadm command, 232-233troubleshooting, 241upgrading, 213workflows, 239-240

WWN (World Wide Name), 118

X–Y–Zxcopy commands, 170-172

XD (eXecuted Disable), 352

XML Configuration Store, 148-150

zones, accessing, 227-228